Papers by Hibba Abd Al-Razzaq T.

Journal of intelligent systems, 2024
Limited device resources and an ever-changing cybersecurity landscape compound the challenges fac... more Limited device resources and an ever-changing cybersecurity landscape compound the challenges faced by the network protection infrastructure for Internet of medical things (IoMT) applications, which include different device ecosystems, privacy concerns, and problems with interoperability. Protecting private medical information in IoMT apps is challenging; a comprehensive strategy that provides user education, standard protocols, and robust security mechanisms is necessary to overcome these obstacles. With the advancement of IoMT, the network of clinical systems, gadgets, and sensors is integrated with the Internet of things (IoT) to enable intelligent healthcare solutions. However, the sensitive data sharing and the substantial connections in the IoMT systems raise security and privacy concerns in the network. Therefore, network security is critical in IoMT applications due to data breaches, vulnerabilities, and distributed denial of service attacks on medical data. This study reviews the network security techniques implemented in the existing studies for IoMT applications using machine learning and blockchain technology. This study presents an overview of IoMT healthcare applications by highlighting the security challenges encountered and the necessity of adopting advanced techniques to deal with complex threats. The research is mainly about how deep reinforcement learning (DRL), commonly used for intrusion detection, access control, and anomaly detection, works over time and how it can be used in IoMT applications. With the notion of providing robust security in IoMT applications, this study appraises the benefits of blockchain technology, such as data integrity, accountability, and confidentiality. Besides, this study addresses the limitations and challenges of various security techniques that IoMT systems employ. This work assesses the findings, research gaps, and future advancements for enhancing network security in IoMT applications. With an extensive analysis of existing research, this survey guides researchers, medical practitioners, and decision-makers to scale up the DRL and blockchain in IoMT systems more efficiently in the future.
Evaluation and Optimization of Computer Multimedia Assisted Network Teaching Information Ecosystem
Analyze and design of secure user authentication protocol for wireless sensor networks
AIP Conference Proceedings, Dec 31, 2022

Journal of intelligent systems, 2024
These days, 5G mobile technology highly influences the wireless communication process, which is m... more These days, 5G mobile technology highly influences the wireless communication process, which is more responsive than the other generation. However, the 5G communication process handles the speed and latency issues while transmitting data over the network. Especially in rural areas, most people face this speed and latency problem while connecting to the network. Therefore, the network uses massive amounts of data to analyse this problem by integrating 5G with the Internet of things (IoT). The IoT-based data transmission and collection helps manage the data capacity, connection, and transmission rate. Therefore, this study uses the novel secured narrowband IoT framework for 5G communication and operational goals based on their position in the market. The 5G network uses business connectivity and access information to manage the data transmission. The network uses cellular bandwidth and IoT devices to connect more during this process. According to the connection, the information is transmitted with the minimum delay. Thus, experimental results have proposed these parameters: an accuracy ratio of 92.5%, a security ratio of 94.4%, a reliability ratio of 93.5%, a latency ratio of 91.8%, a cost-effective ratio of 20.5%, and a throughput ratio of 25.4% compared to other methods.

International Journal of Scientific Research in Science and Technology, 2018
Recently, the using of wireless sensor network as the most important technique necessary accordin... more Recently, the using of wireless sensor network as the most important technique necessary according different application, such as water resources conditions for living in safe. This is due to the shortage in groundwater, river resources and rain level. This project design a structure of complete wireless sensor network structure to monitor the different water levels and verity water quality according to water well-field and the consumed electrical power of the installed pump. The utilized sensors use the energy saving techniques and allocate the controller sensor to work as a PAN coordinator. The designed structure has been implemented and tested using SQL,GUI under the environment of visual studio C#. The obtained results from the simulator appear the efficient of the system in monitoring the wells factors.

Periodicals of Engineering and Natural Sciences (PEN), Feb 17, 2022
In the Internet of Things (IoT) environment, a network of devices is connected to exchange inform... more In the Internet of Things (IoT) environment, a network of devices is connected to exchange information to perform a specific task. Wi-Fi technology plays a significant role in IoT based applications. Most of the Wi-Fi-based IoT devices are manufactured without proper security protocols. Consequently, the low-security model makes the IoT devices vulnerable to intermediate attacks. The attacker can quickly target a vulnerable IoT device and breaches that vulnerable device's connected network devices. So, this research suggests a password protection based security solution to enhance Wi-Fi-based IoT network security. This password protection approach utilizes the secure remote password protocol (SRPP) in Wi-Fi network protocols to avoid brute force attack and dictionary attack in Wi-Fi-based IoT applications. The performance of the IoT security solution is implemented and evaluated in the GNS3 simulator. The simulation analysis report shows that the suggested password protection approach supports scalability, integrity and data protection against intermediate attacks.
An Improved Network Steganography System by Manipulating IPV6 to Increase Imperceptibility and Capacity of The System

SS-FD: Internet of medical things based patient health monitoring system
Periodicals of Engineering and Natural Sciences (PEN), 2021
Internet of Medical Things (IoMT) consists of connected devices used to collect patient health in... more Internet of Medical Things (IoMT) consists of connected devices used to collect patient health information in a real-time environment. The IoMT device effectively handles medical issues by using health wearable and medical-grade wearables. Although IoMT can process the collected data, it has few pitfalls, such as interoperability of data, standardization issues, and computation complexity while detecting disease. By considering these issues, in this work, IoMT is utilized in the field of the remote patient monitoring system. Initially, the IoMT devices are placed on the human body and collect their health information continuously. The gathered details are processed using a salp swarm optimized fuzzy deep neural network (SS-FD). This system supports the patient health monitoring process with minimum low-cost consumption. The SS-FD classifier processes the obtained data; primary and emergency data is classified according to the fuzzy rule. This process improves the remote patient heal...

Central Multipath Routing to Minimize Congestion in Tcp/Ip Networks Using Neural Networks
Neural networks used to resolve the issue of multipath routing in TCP/IP networks. In this paper,... more Neural networks used to resolve the issue of multipath routing in TCP/IP networks. In this paper, the proposed method to design neural networks for solving this problem is centrally described. Through that, this method will be applied to an example of a TCP/IP computer network. Two types of neural networks are used in this work that is Feed Forward Neural Network (FFNN) and Elman Recurrent Neural Network (ERNN). FFNNs are used as recurrent neural networks to make a central multipath routing decision. ERNN is used to solve the same problems that the FFNN solve it for improving the performance of the TCP/IP computer networks. The multipath routing decision strongly depends on the congestion status of nodes or links in TCP/IP computer networks. Then, the treatment of congestion will be included in the proposed method, finally, The outcomes gotten through training plus testing phases of the proposed neural networks, the simulation program display their excellent implementation in making...

Now-a-days, supply chain management is one of the crucial factors in business for identifying the... more Now-a-days, supply chain management is one of the crucial factors in business for identifying the flow of goods, raw material storage, movement of products and inventory process so on. The main aim of the supply chain management process is to provide the valuable business services, infrastructure, logistic control and inventory control to the business for improving the business. Among the various supply chain factors, inventory control is one of the difficult tasks in supply chain management process because of high cost inventory, consistent stockouts, low rate of inventory turnover, high value of obsolete inventory, maximum working capital, huge cost for storage and lot customers. Then, several supply chain management techniques are introduced in traditional to control the inventory process but they are failing to detect with greatest accuracy due to the low convergence rate in computation techniques. So, in this paper introduce the effective and optimized neural network computatio...

Periodicals of Engineering and Natural Sciences, 2021
Internet of Medical Things (IoMT) consists of connected devices used to collect patient health in... more Internet of Medical Things (IoMT) consists of connected devices used to collect patient health information in a real-time environment. The IoMT device effectively handles medical issues by using health wearable and medical-grade wearables. Although IoMT can process the collected data, it has few pitfalls, such as interoperability of data, standardization issues, and computation complexity while detecting disease. By considering these issues, in this work, IoMT is utilized in the field of the remote patient monitoring system. Initially, the IoMT devices are placed on the human body and collect their health information continuously. The gathered details are processed using a salp swarm optimized fuzzy deep neural network (SS-FD). This system supports the patient health monitoring process with minimum low-cost consumption. The SS-FD classifier processes the obtained data; primary and emergency data is classified according to the fuzzy rule. This process improves the remote patient health data analysis and reduces the difficulties involved in the patient health analysis. Then the efficiency of the system is evaluated using experimental results.

Minimizing network traffic overload and packet loss in wireless asynchronous traffic mode using switching model with adopted multiple access control approach
Wireless Asynchronous Transfer Mode (WATM) is one of the effective natural wireless counterparts ... more Wireless Asynchronous Transfer Mode (WATM) is one of the effective natural wireless counterparts that are developed in the telephone industry to transmit integrated traffics such as video, data, and voice information. The WATM supports a wide range of designs, controlling mechanisms, simulation techniques to perform the traffic transmission process. During this process, network congestion, cell delay, and traffic overload are one of the main issues that reduce the entre WATM performance. So, in this work, effective switching model with adopted multiple access control approach is used. The introduced method reduces the network traffic and minimizes the cell packet loss effectively. The discussed system implemented using simulation software such as “OPNET 10.5”, and the efficiency of the WATM system is evaluated with respective experimental results.

Avoiding collisions is an important matter in the majority of transport systems and in many other... more Avoiding collisions is an important matter in the majority of transport systems and in many other applications in driverless cars it is very important to have an active collision avoidance system since only the car to take an action and no driver to help. The goals of collision avoidance systems are tracking objects of possible collision risks and decide any action to avoid or mitigate a collision with the help of sensors and radars. Car accidents have become quite common nowadays. After investigations, conclusions have stated that a great deal of those accidents happened because drivers fail to stop the car at the right time. Sometimes, the pedestrians are not crossing the road at the right time. Researchers discovered that about 35 percent of people die due to accidents, 98 percent of which die because of fatal road accidents. Many car industries have proposed an AI system in the vehicles for the aim of reducing accidents and this is considered as the backbone of the auto-driven c...
Recently, the water resource becomes the most important conditions for living in safe. This is du... more Recently, the water resource becomes the most important conditions for living in safe. This is due to the shortage in groundwater, river resources and rain level. This project design a complete sensor network structure to monitor the water levels and water qulity of the considered water wellfield and the consumed electrical power of the installed pump. The utilized sensors use the energy saving techniques and allocate the controller sensor to work as a PAN coordinator. The designed structure has been implemented and tested using MIXIM framework under the environment of OMNET++ simulator. The obtained results from the simulator appear the efficient of the system in monitoring the wells factors.
Secure data transfer aware grouping technique for cloud-assisted Internet of things applications
International Journal of Communication Systems
Secure data transfer aware grouping technique for cloud-assisted Internet of things applications
International Journal of Communication Systems
Uploads
Papers by Hibba Abd Al-Razzaq T.