6 found
Order:
  1.  11
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  78
    Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems.Bashar Ahmad Khalaf, Salama A. Mostafa, Hayder H. Safi, Khalid Mohammed Saffer & Ihsan Salman - 2023 - Journal of Intelligent Systems 32 (1).
    The efficiency of distribution networks is hugely affected by active and reactive power flows in distribution electric power systems. Currently, distributed generators (DGs) of energy are extensively applied to minimize power loss and improve voltage deviancies on power distribution systems. The best position and volume of DGs produce better power outcomes. This work prepares a new hybrid SSA–GWO metaheuristic optimization algorithm that combines the salp swarm algorithm (SSA) and the gray wolf optimizer (GWO) algorithm. The SSA–GWO algorithm ensures generating the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  44
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  7
    A general framework of multiple coordinative data fusion modules for real-time and heterogeneous data sources.Rozanawati Darman, Hanayanti Hafit, Aida Mustapha, David Lim, Salama A. Mostafa & Shafiza Ariffin Kashinath - 2021 - Journal of Intelligent Systems 30 (1):947-965.
    Designing a data-responsive system requires accurate input to ensure efficient results. The growth of technology in sensing methods and the needs of various kinds of data greatly impact data fusion (DF)-related study. A coordinative DF framework entails the participation of many subsystems or modules to produce coordinative features. These features are utilized to facilitate and improve solving certain domain problems. Consequently, this paper proposes a general Multiple Coordinative Data Fusion Modules (MCDFM) framework for real-time and heterogeneous data sources. We develop (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  7
    Hessenberg factorization and firework algorithms for optimized data hiding in digital images.Salama A. Mostafa, Jamal N. Hasoon, Muhanad Tahrir Younis & Methaq Talib Gaata - 2022 - Journal of Intelligent Systems 31 (1):440-453.
    Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is separated into three components (RGB). Consequently, the discrete wavelet transform is applied to each component to obtain four bands (high–high, high–low, low–high, and low–low), resulting in 12 bands in total. By omitting the low–low band from each component, a new square matrix (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  25
    Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction.Salama A. Mostafa, Bashar Ahmed Khalaf, Ahmed Mahmood Khudhur, Ali Noori Kareem & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 31 (1):1-14.
    Floods are one of the most common natural disasters in the world that affect all aspects of life, including human beings, agriculture, industry, and education. Research for developing models of flood predictions has been ongoing for the past few years. These models are proposed and built-in proportion for risk reduction, policy proposition, loss of human lives, and property damages associated with floods. However, flood status prediction is a complex process and demands extensive analyses on the factors leading to the occurrence (...)
    Direct download  
     
    Export citation  
     
    Bookmark