{"title":"SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes","authors":"Omar Dawood","doi":"10.52866/ijcsm.2024.05.03.011","DOIUrl":"https://doi.org/10.52866/ijcsm.2024.05.03.011","url":null,"abstract":"With the recent increase in the risks and attacks facing our daily lives and digital environment around us,the trend towards securing data has become inevitable. Block ciphers play a crucial role in modern crypto-applicationssuch as secure network storage and signatures and are used to safeguard sensitive information. The present paperdevelops a new variant of the symmetric model called SUMER family ciphers with three equivalent modes: lightweight,conventional (traditional), and extended ciphers. SUMER name belongs to one of the oldest civilizations inMesopotamia and stands for Secure Universal Model of Encryption Robust Cipher. The SUMER cipher is based on asimple and robust symmetric structure and involves solid algebraic theories that completely depend on the Galois FieldGF(28). SUMER cipher is designed to work with two involutional structures of the Substitution-Permutation Network(SPN) and Feistel structure. These two involutional structures mean that the same algorithm is used for the encryptionand decryption process, and only the algorithm of the ciphering key is used in reverse order in both structures. TheSUMER lightweight structure is an elegant mode that does not need building an S-Box that requires a large amount ofmemory and a number of electronic logical gates as S-Box construction has been canceled and replaced by the on-flycomputation clue, which does not need a reserved memory for building S-Box. SUMER family ciphers also can work ina traditional mode or as an extended mode with high margin security. This family of ciphers is applicable with multimodes of various utilizations. The proposed ciphers are designed to be byte-oriented, showing good evaluation andresults under several measurement tests for speed, time implementation, and efficiency.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":" 605","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141669491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Efficiency and Fine-Grained Control in Redactable Blockchains with EPBCHF","authors":"Shams Abdali, Mohd Najwadi Y, Hasan Falah Hasan","doi":"10.52866/ijcsm.2024.05.03.010","DOIUrl":"https://doi.org/10.52866/ijcsm.2024.05.03.010","url":null,"abstract":" Blockchain technology has presented a promising decentralized paradigm to preclude trusted thirdparties' dominancy. It is a transparent and distributed ledger initially designed for digital cryptocurrencies whilecurrently extended to serve various industries. However, Blockchain immutability presents challenges, as it can bemisused for storing illicit content, violating privacy regulations, and limiting data management flexibility. PolicyBased Chameleon Hash Function (PBCH) has transformed blockchain rewriting contents concept via permittingmodifiers to amend certain transaction since they possessed fundamental privileges satisfying certain access policy.However, PBCHF suffers from efficiency issues due to its reliance on Chameleon Hash ephemeral Trapdoor (CHET)and Attribute-Based Encryption (ABE), significantly impacting overall efficiency. We propose the Efficient PolicyBased Chameleon (EPBCHF) construction by replacing CHET with Chameleon-Hashes by Dual Long-TermTrapdoors (CHDLTT) to address these challenges. Additionally, we introduce an enhanced encryption schemeresilient against chosen-ciphertext attacks (CCA) without compromising overall efficiency. Modelling EPBCHFproves practical instantiation accompanied by rigorous security proofs. Our construction provides a fine-grainedredactable blockchain in comparison to the currently proposed solutions. The evaluated results confirm that theproposed EPBCHF is scalable and efficient due to having the ability to handle unlimited transaction volumesadditionally, data is efficiently processed without further overhead meanwhile data size consistency reflects a robustmemory management due to predicted memory size, network bandwidth and storage requirement for future growththereby, EPBCHF is proven to be reliable and scalable.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":" 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141672597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alan Jalal Abdulqader, S. Redhwan, Ali Hasan Ali, Omar Bazighifan, Awad T. Alabdala
{"title":"Picard and Adomian decomposition methods for a fractional quadratic integral equation via generalized fractional integral","authors":"Alan Jalal Abdulqader, S. Redhwan, Ali Hasan Ali, Omar Bazighifan, Awad T. Alabdala","doi":"10.52866/ijcsm.2024.05.03.008","DOIUrl":"https://doi.org/10.52866/ijcsm.2024.05.03.008","url":null,"abstract":" The primary focus of this paper is to thoroughly examine and analyze a class of a fractional quadraticintegral equation via generalized fractional integral. To achieve this, we introduce an operator that possessesfixed points corresponding to the solutions of the fractional quadratic integral equation, effectively transforming thegiven equation into an equivalent fixed-point problem. By applying the Banach fixed-point theorems, we prove theuniqueness of solutions to fractional quadratic integral equation. Additionally, The Adomian decomposition methodis used, to solve the resulting fractional quadratic integral equation. This technique rapidly provides convergentsuccessive approximations of the exact solution to the given fractional quadratic integral equation, therefore, weinvestigate the convergence of approximate solutions, using the Adomian decomposition method. Finally, we providesome examples, to demonstrate our results. Our findings contribute to the current understanding of fractionalquadratic integral equation and their solutions and have the potential to inform future research in this area.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":" 29","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141672530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Omran, Sahar Yousif Mohammed, Mohammed Aljanabi, Mohammad Aljanabi
{"title":"Detecting Data Poisoning Attacks in Federated Learning for Healthcare Applications Using Deep Learning","authors":"A. Omran, Sahar Yousif Mohammed, Mohammed Aljanabi, Mohammad Aljanabi","doi":"10.52866/ijcsm.2023.04.04.018","DOIUrl":"https://doi.org/10.52866/ijcsm.2023.04.04.018","url":null,"abstract":"This work presents a novel method for securing federated learning in healthcare applications, focusing on skin cancer classification. The suggested solution detects and mitigates data poisoning attacks using deep learning and CNN architecture, specifically VGG16. In a federated learning architecture with ten healthcare institutions, the approach ensures collaborative model training while protecting sensitive medical data. Data is meticulously prepared and preprocessed using the Skin Cancer MNIST: HAM10000 dataset. The federated learning approach uses VGG16's powerful feature extraction to classify skin cancer. A robust strategy for spotting data poisoning threats in federated learning is presented in the study. Outlier detection techniques and strict criteria flag andevaluate problematic model modifications. Performance evaluation proves the model's accuracy, privacy, and datapoisoning resilience. This research presents federated learning-based skin cancer categorization for healthcareapplications that is secure and accurate. The suggested approach improves healthcare diagnostics and emphasizesdata security and privacy in federated learning settings by tackling data poisoning attacks.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Particle Swarm Optimization for Penalize cox models in long-term prediction of breast cancer data","authors":"Ehab Abbas Fadhil, Basad Al-Sarray","doi":"10.52866/ijcsm.2023.04.04.017","DOIUrl":"https://doi.org/10.52866/ijcsm.2023.04.04.017","url":null,"abstract":"The particle swarm optimization algorithm (PSO) was applied to penalize the Cox model for predicting long-term outcomes of breast cancer patients. This study makes use of data on 198 patients' breast cancer survival, including their age, estrogen receptor status, tumor size, and grade, as well as the expression levels of 76 genes. The objective was to identify a subset of features that could accurately predict patient survival while controlling for overfitting and model complexity. PSO was used to search for optimal model parameters. The algorithm was designed to minimize a penalized partial likelihood function, which balances the tradeoff between an accurate model and model complexity. The values of the objective function were compared with other feature selection techniques, including the Least Absolute Shrinkage and Selection Operator (LASSO) and Elastic regression, and were found to perform better in relation to predictive accuracy and feature selection. The study results showed that PSO-based Cox models with cross-validation to regularization parameters had higher prediction accuracy than models trained with other feature selection methods. The PSO algorithm identified a subset of features that were consistently selected across multiple iterations, indicating their importance in predicting patient survival. Overall, the study demonstrates the potential of PSO-based feature selection in improving the accuracy and interpretability of Cox regression models for predicting long-term outcomes in breast cancer patients.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139236007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Adil Nafea, Muthanna Mishlish, Ali Muwafaq Shaban Shaban, Mohammed M AL-Ani, K. Alheeti, Hussam J. Mohammed
{"title":"Enhancing Student's Performance Classification Using Ensemble Modeling","authors":"Ahmed Adil Nafea, Muthanna Mishlish, Ali Muwafaq Shaban Shaban, Mohammed M AL-Ani, K. Alheeti, Hussam J. Mohammed","doi":"10.52866/ijcsm.2023.04.04.016","DOIUrl":"https://doi.org/10.52866/ijcsm.2023.04.04.016","url":null,"abstract":"A precise prediction of student performance is an important aspect within educational institutions toimprove results and provide personalized support of students. However, the predication accuracy of studentperformance considers an open issue within education field. Therefore, this paper proposes a developed approachto identify performance of students using a group modeling. This approach combines the strengths of multiplealgorithms including random forest (RF), decision tree (DT), AdaBoosts, and support vector machine (SVM).Afterward, the last ensemble estimates as one of the bets logistic regression methods was utilized to create a robustand reliable predictive model because it considers The experiments were evaluated using the Open UniversityLearning Analytics Dataset (OULAD) benchmark dataset. The OULAD dataset considers a comprehensive datasetcontaining various characteristics related to the student’s activities thereby five cases based on the utilized datasetwere investigated. The experiment results showed that the proposed ensemble model presented its ability withaccurate results to classify student performance by achieving 95% of accuracy rate. As a result, the proposed modelexceeded the accuracy of individual basic models by using the strengths of various algorithms to improve thegeneralization by reducing the potential weaknesses of individual models. Consequently, the education institutescan easily identify students who may need additional support and interventions to improve their academicperformance.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"38 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139259973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qahtan M. Yas, Abdulbasit Alazzawi, B. Rahmatullah
{"title":"A Comprehensive Review of Software Development Life Cycle methodologies: Pros, Cons, and Future Directions","authors":"Qahtan M. Yas, Abdulbasit Alazzawi, B. Rahmatullah","doi":"10.52866/ijcsm.2023.04.04.014","DOIUrl":"https://doi.org/10.52866/ijcsm.2023.04.04.014","url":null,"abstract":"The software development process needs specific and studied steps within a reliable plan to achieve the requirements for the success of any project. Software development life cycle (SDLC) methodologies have provided several models that meet the needs of the various proposed projects. These methodologies present various scenarios that can be applied in the process of developing systems to make them more efficient and predictive. The paper aims to illuminate the paramount Software Development Life Cycle (SDLC) methodologies by conducting a comprehensive review of the pros and cons of the various models widely used for software design. Furthermore, the paper discusses fundamental trajectories that are shaping the future landscape of SDLC methodologies. This review included two main types of software development life cycle approaches such as traditional SDLC (heavy-weight) and agile SDLC (light-weight) approaches. The traditional approach included several models such as the Waterfall model, Iterative model, Spiral model, V-Model, and Big Bang Model. Whereas, the agile approach included various models such as the eXtreme Programming (XP) Model, scrum Model, Feature Driven Development (FDD) Model, and Kanban Model. A comprehensive analytical study of all software development life cycle models was achieved and highlighted their most prominent strengths and weaknesses of them. SDLC methodologies wield substantial ramifications across a multitude of sectors, contingent upon several models tailored to individual developmental and research contexts. In culmination, the paper furnishes an all-encompassing perspective on paramount SDLC models, encompassing two principal paradigms: the traditional and the agile approaches. These encompass fundamental sub-models that encapsulate pioneering models poised for application in system development, thus facilitating their refinement more efficiently and predictably.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"6 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139278038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An investigation of Internet Service Provider selection criteria: A systematic literature review","authors":"Mohammed Naji, S. Thiruchelvam, Mohammed Khudari","doi":"10.52866/ijcsm.2023.04.04.013","DOIUrl":"https://doi.org/10.52866/ijcsm.2023.04.04.013","url":null,"abstract":"In today’s highly competitive business environment, organizations need to collaborate with strategic partners to provide high quality services at lower cost to maintain their effectiveness and efficiency. Hence, the concept of Supply Chain Management (SCM) emerged to effectively coordinate and manage financial, physical, and information activities within organizations and among all participating external parties. Qualitative and quantitative factors must be considered in SCM to ensure sustainable development. The research investigates the metrics and criteria influencing the process of selecting an Internet service provider (ISP) from 2001 to 2022 to assess the extent to which these factors have met the requirements of current decision-makers. It is appropriate to conduct a literature review in light of the changes in the purchasing process and determine its suitability for choosing an ISP. A comprehensive literature review of 51 articles published during the above period was conducted to ensure coverage of the latest ISP selection criteria. The results indicate a decline in the importance of criteria related to cost and prices and an increase in the importance of criteria such as quality, reliability, and performance, as evidenced by their repeated mention in the literature.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"11 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139278763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. E. Kamarudin, Mohamed Ariff Ameedeen, Mohd Faizal Ab Razak, A. Zabidi
{"title":"Integrating Edge Computing and Software Defined Networking in Internet of Things: A Systematic Review","authors":"I. E. Kamarudin, Mohamed Ariff Ameedeen, Mohd Faizal Ab Razak, A. Zabidi","doi":"10.52866/ijcsm.2023.04.04.011","DOIUrl":"https://doi.org/10.52866/ijcsm.2023.04.04.011","url":null,"abstract":"The Internet of Things (IoT) has transformed our interaction with the world by connecting devices, sensors, and systems to the Internet, enabling real-time monitoring, control, and automation in various applications such as smart cities, healthcare, transportation, homes, and grids. However, challenges related to latency, privacy, and bandwidth have arisen due to the massive influx of data generated by IoT devices and the limitations of traditional cloud-based architectures. Moreover, network management, interoperability, security, and scalability issues have emerged due to the rapid growth and heterogeneous nature of IoT devices. To overcome such problems, researchers proposed a new architecture called Software Defined Networking for Edge Computing in the Internet of Things (SDN-EC-IoT), which combines Edge Computing for the Internet of Things (EC-IoT) and Software Defined Internet of Things (SDIoT). Although researchers have studied EC-IoT and SDIoT as individual architectures, they have not yet addressed the combination of both, creating a significant gap in our understanding of SDN-EC-IoT. This paper aims to fill this gap by presenting a comprehensive review of how the SDN-EC-IoT paradigm can solve IoT challenges. To achieve this goal, this study conducted a literature review covering 74 articles published between 2019 and 2023. Finally, this paper identifies future research directions for SDN-EC-IoT, including the development of interoperability platforms, scalable architectures, low latency and Quality of Service (QoS) guarantees, efficient handling of big data, enhanced security and privacy, optimized energy consumption, resource-aware task offloading, and incorporation of machine learning.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"139 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139278971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Aljanabi, M. Yaseen, Ahmed Hussein Ali, Mostafa Abdulghafoor Mohammed
{"title":"Prompt Engineering: Guiding the Way to Effective Large Language Models","authors":"Mohammad Aljanabi, M. Yaseen, Ahmed Hussein Ali, Mostafa Abdulghafoor Mohammed","doi":"10.52866/ijcsm.2023.04.04.012","DOIUrl":"https://doi.org/10.52866/ijcsm.2023.04.04.012","url":null,"abstract":"Large language models (LLMs) have become prominent tools in various domains, such as natural language processing, machine translation, and the development of creative text. Nevertheless, in order to fully exploit the capabilities of Language Models, it is imperative to establish efficient communication channels between humans and machines. The discipline of engineering involves the creation of well-constructed and informative prompts, which act as a crucial link between human intention and the execution of tasks by machines. The present study examines the concept of rapid engineering, elucidating its underlying concepts, methodologies, and diverse range of practical applications.","PeriodicalId":158721,"journal":{"name":"Iraqi Journal for Computer Science and Mathematics","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}