
Harith Ghanim Ayoub
Research InterestsSecurity
Networkiming
Linux Administrations
Cryptography
IT
Gender | MALE |
---|---|
Place of Work | Technical Management Institute Nineveh |
Position | Departmental Course |
Qualification | Master |
Speciality | Computer Network Security |
harithga@ntu.edu.iq | |
Phone | 07740895432 |
Address | Mosul/Alfalah second, Nineveh, Mosul, Iraq |

90 +
Security protocol 802.1x invention
100 +
A new method for hiding a secret file in several WAV files depends on circular secret key
100 +
Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA
100 +
Review of Encrypted Virus: Detection analyses Methods
100 +
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
100 +
Analysis and Implementation of the Authentication Protocol 802. 1x
90 +
Design of A Dual-band Square Slot Antenna for GPS Applications
Skills
Networking (90%)
Security (80%)
Cisco IT (95%)
Image processing (80%)
Image Designer (70%)
Data Analytics (80%)
Cryptography (90%)
Hardwarw Security (95%)
Linux Adminstration (95%)
Academic Qualification
Bsc computer engineering / College of Engineering/Mosul University
Sep 1, 1998 - Jul 1, 2022Masster
Oct 1, 2011 - Nov 21, 2013Electrical Engineering
Electronic and Communication
Computer Network security
Publications
Advanced Denoising of EMG Signals for Medical Applications: A Novel Arduino-Based Enhancement Approach
Apr 4, 2025Journal ESP International Journal of Advancements in Science & Technology
publisher ESP Journals - Eternal Scientific Publications
DOI 10.56472/25839233/IJAST-V3I2P103
Issue 2
Volume 3
The accurate interpretation of electromyography (EMG) signals is crucial for medical diagnostics and rehabilitation systems. However, the inherent presence of noise, including motion artifacts and powerline interference, significantly hampers signal clarity. This research presents a novel, cost-effective approach for advanced EMG signal denoising using an Arduino-based platform integrated with custom signal processing techniques. By leveraging optimized digital filtering algorithms, the proposed system effectively suppresses noise while preserving critical muscle activity patterns. Experimental results demonstrate a significant improvement in signal-to-noise ratio (SNR), providing clean and reliable EMG data for enhanced medical analysis and real-time biomedical applications. The simplicity, affordability, and efficiency of the system position it as a promising solution for portable healthcare and rehabilitation devices.
Efficient Real-Time Key Generation for IoT Using Multi-Dimensional Chaotic Maps
Mar 22, 2025Journal International Journal of Computational and Electronic Aspects in Engineering
publisher Nagpur: Research Association of Masters of Engineering (RAME)
DOI https://doi.org/10.26706/ijceae.6.1.20250205
Issue 1
Volume 6
The paper presents a new approach for triple key generation techniques with Henon, Lozi and Duffing chaotic maps in FPGA. Three key streams generated by XORing chaotic maps with pseudo random number generators, the results of XORing PN1 with PN2 is called gold code generator. The algorithm was built in embedded Xilinx System Generator tool (XSG) and the results were validated using MATLAB/SIMULINK environment. NIST, Normality and Dieharder test randomness tests were employed for key streams and verified as the best randomness in comparison with recent work
Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA
Oct 24, 2024Journal Ain Shams Engineering Journal
publisher Elsevier
DOI https://doi.org/10.1016/j.asej.2024.103016
Issue 11
Volume 15
Frequency hopping is a main technique for wireless communication, avoiding interference and interception. This paper provides novel hardware design for frequency-hopping pseudorandom bit generator (PRBG).PRBG design by chaotic maps on FPGA.Two proposed methods in this work first combine chaotic maps in a cascade manner called fixed point cascade chaotic maps (FPCCM-FHSS), and second, the conjunction of chaotic maps done in an XORed manner called fixed point an XOR chaotic method (FPXORCM-FHSS).The results were the first eight NIST randomness tests.Frequency indicates that all p-values larger than 0.01 are needed to achieve better randomness,Second and third were die-hard tests, many distribution tests with significant p-values (p <0.01) that meet high standards of statistical randomness, making them suitable for channel security.Last were the FPGA results between the proposed methods for speed and hardware resources).The works implemented on XILINX ZC702 achieved 2 Gbps to meet the speed requirements of the change of the carrier frequency.
Design of A Dual-band Square Slot Antenna for GPS Applications
Aug 4, 2022Journal TELEMATIQUE
publisher Maracaibo [Zulia]: Universidad Dr. Rafael Belloso Chacín
Issue 1
Volume 21
A New Design single feed dual band micro-strip patch antenna that implemented in GPS applications is presented. The suggested antenna based on two bands of GPS systems. they are L1=1.575 GHz and L2=1.227 GHz. The suggested antenna principally comprises two resonance frequencies with contents square patch, two semi-circle, two rectangular slots, S - shaped slot, two truncated slot and four circle slots in the ground plane, which fed by a 50 𝛺 coaxial probe, with over all area of 94*94 mm2. The software CST Microwave studio is used to build a simulation for the suggested antenna. The results of the simulation showed an impedance for bandwidth of 20 MHz between (1.56 GHz - 1.58 GHz) by using L1 band, while L2 band, it was 20 MHz between (1.21 - 1.23GHz). The results also showed that the circular polarization radiation can be obtained through a probe feeding at one of the diagonal lines of the patch. This antenna can reduce the loss in S11, impedance behavior, Gain and farfield radiation pattern.
A new method for hiding a secret file in several WAV files depends on circular secret key
Jul 19, 2022Journal Egyptian Informatics Journal
publisher Elsevier
DOI https://doi.org/10.1016/j.eij.2022.06.003
Issue 4
Volume 23
The technique of information hiding is very important in achieving security of important and sensitive data, especially those that are transmitted through various digital communication channels because it has robust characteristics that distinguish it from encryption techniques, the most important of which is that it is not perceived by protrusive and hackers, as it is based on the principle of hiding those data inside other digital media as a carrier cover. On the other hand, with the development of hiding techniques, techniques developed to try extracting its hiding to hacking its contents, for this reason and to increase the efficiency of these methods, the encryption and hiding techniques was combined together. The proposed method depends on distributing secret data on several digital audio files of type WAV in random way depends on circular secret key values that is generated in random order that be agreed upon between the sender and the receiver. This technique has achieved high durability, and in the event of suspicion of the existence of secret content within any WAV file, the multiplicity of carrier files and their different length, as well as random distribution of data in them, all these characteristic eliminates the suspicion of any confidential content, as well as complicates the file retrieved process if the suspicion be occurs.
Medical Data Technology For Automatic Diagnosis System
Jun 14, 2022Journal Journal of Positive Sciences (JPS)
publisher Mumbai: Ve Technology Pvt. Ltd
Issue 12
Volume 2022
New industries utilising image processing technology in the medical business, notably for sickness detection, are emerging as a result of the popularity of image processing and its benefits. Grayscale images, such as X-rays and CT scans, provide a classification problem in medical applications since only grey channel information is available and no chronic information is available. A convolutional neural network (CNN) is utilised to detect breast cancer in this study, with huge coloured MRI images used to train the CNN model. Other models used were Random Forest, K-nearest Neighbour, and Nave Biase. CNN's cancer prediction accuracy of 95.12 percent may be maintained in the future.
Analysis and Implementation of the Authentication Protocol 802.1x
Dec 2, 2014Journal International Journal of Computer Applications
Issue 4
Volume 87
The security of wireless networks against hacker attacks depends on some parameters and special configurations. Authentication is considered as one of the most important security parameter in computer networks [1]. The communication for example between users through the internet must be authenticated by both sides in order to prevent hackers from pretending any one of them [2]. Authentication process has the function to allow or prevent users from accessing the wireless network like IEEE 802.11b or 802.11g, it can be applied also to wired networks [3]. IEEE 802.1X [4] is the famous standard which uses Extensible Authentication Protocol (EAP) to authenticate users before giving them access to the network [5]. The process of authentication is extended to include RADIUS protocol which is designed to authenticate remote users within special organizations, then upgraded to include most of the operating systems and computer networks. It is now the most famous and applicable protocol for authenticating remote users [6]. Recently, the operating system Android has dominated other operating systems, it is based on Linux core and has the capability to support 802.1x and other security protocols [7]. In this paper, 802.1x protocol is applied to authenticate users using windows 7 and Android operating systems, a comparison to show the main differences between them is introduced successfully in mixed (computer & mobiles) network.
Conferences
Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA
Dec 10, 2023 - Dec 12, 2023Publisher Baghdad Science Journal
DOI https://doi.org/10.21123/bsj.2024.10521
Country iraq
Location oman
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Oct 31, 2022 - Nov 1, 2022Publisher IEEE
DOI 10.1109/ICCITM56309.2022.10031751
Country Iraq
Location Mosul
Review of Encrypted Virus: Detection analyses Methods
Mar 19, 2021 - Mar 20, 2021Publisher IEEE
DOI 10.1109/ICACCS51430.2021.9441915
Country India
Location Coimbatore