Profile Image
Lecturer

Harith Ghanim Ayoub

Research Interests

Security

Networkiming

Linux Administrations

Cryptography

IT

Gender MALE
Place of Work Technical Management Institute Nineveh
Position Departmental Course
Qualification Master
Speciality Computer Network Security
Email harithga@ntu.edu.iq
Phone 07740895432
Address Mosul/Alfalah second, Nineveh, Mosul, Iraq

90 +

Security protocol 802.1x invention

100 +

A new method for hiding a secret file in several WAV files depends on circular secret key

100 +

Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA

100 +

Review of Encrypted Virus: Detection analyses Methods

100 +

Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process

100 +

Analysis and Implementation of the Authentication Protocol 802. 1x

90 +

Design of A Dual-band Square Slot Antenna for GPS Applications

Skills

Networking (90%)
Security (80%)
Cisco IT (95%)
Image processing (80%)
Image Designer (70%)
Data Analytics (80%)
Cryptography (90%)
Hardwarw Security (95%)
Linux Adminstration (95%)
working experience

Academic Qualification

Bsc computer engineering / College of Engineering/Mosul University
Sep 1, 1998 - Jul 1, 2022

Masster
Oct 1, 2011 - Nov 21, 2013

Electrical Engineering
Electronic and Communication
Computer Network security

Publications

Advanced Denoising of EMG Signals for Medical Applications: A Novel Arduino-Based Enhancement Approach
Apr 4, 2025

Journal ESP International Journal of Advancements in Science & Technology

publisher ESP Journals - Eternal Scientific Publications

DOI 10.56472/25839233/IJAST-V3I2P103

Issue 2

Volume 3

The accurate interpretation of electromyography (EMG) signals is crucial for medical diagnostics and rehabilitation systems. However, the inherent presence of noise, including motion artifacts and powerline interference, significantly hampers signal clarity. This research presents a novel, cost-effective approach for advanced EMG signal denoising using an Arduino-based platform integrated with custom signal processing techniques. By leveraging optimized digital filtering algorithms, the proposed system effectively suppresses noise while preserving critical muscle activity patterns. Experimental results demonstrate a significant improvement in signal-to-noise ratio (SNR), providing clean and reliable EMG data for enhanced medical analysis and real-time biomedical applications. The simplicity, affordability, and efficiency of the system position it as a promising solution for portable healthcare and rehabilitation devices.

Read Publication

Efficient Real-Time Key Generation for IoT Using Multi-Dimensional Chaotic Maps
Mar 22, 2025

Journal International Journal of Computational and Electronic Aspects in Engineering

publisher Nagpur: Research Association of Masters of Engineering (RAME)

DOI https://doi.org/10.26706/ijceae.6.1.20250205

Issue 1

Volume 6

The paper presents a new approach for triple key generation techniques with Henon, Lozi and Duffing chaotic maps in FPGA. Three key streams generated by XORing chaotic maps with pseudo random number generators, the results of XORing PN1 with PN2 is called gold code generator. The algorithm was built in embedded Xilinx System Generator tool (XSG) and the results were validated using MATLAB/SIMULINK environment. NIST, Normality and Dieharder test randomness tests were employed for key streams and verified as the best randomness in comparison with recent work

Read Publication

Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA
Oct 24, 2024

Journal Ain Shams Engineering Journal

publisher Elsevier

DOI https://doi.org/10.1016/j.asej.2024.103016

Issue 11

Volume 15

Frequency hopping is a main technique for wireless communication, avoiding interference and interception. This paper provides novel hardware design for frequency-hopping pseudorandom bit generator (PRBG).PRBG design by chaotic maps on FPGA.Two proposed methods in this work first combine chaotic maps in a cascade manner called fixed point cascade chaotic maps (FPCCM-FHSS), and second, the conjunction of chaotic maps done in an XORed manner called fixed point an XOR chaotic method (FPXORCM-FHSS).The results were the first eight NIST randomness tests.Frequency indicates that all p-values larger than 0.01 are needed to achieve better randomness,Second and third were die-hard tests, many distribution tests with significant p-values (p <0.01) that meet high standards of statistical randomness, making them suitable for channel security.Last were the FPGA results between the proposed methods for speed and hardware resources).The works implemented on XILINX ZC702 achieved 2 Gbps to meet the speed requirements of the change of the carrier frequency.

Read Publication

Design of A Dual-band Square Slot Antenna for GPS Applications
Aug 4, 2022

Journal TELEMATIQUE

publisher Maracaibo [Zulia]: Universidad Dr. Rafael Belloso Chacín

Issue 1

Volume 21

A New Design single feed dual band micro-strip patch antenna that implemented in GPS applications is presented. The suggested antenna based on two bands of GPS systems. they are L1=1.575 GHz and L2=1.227 GHz. The suggested antenna principally comprises two resonance frequencies with contents square patch, two semi-circle, two rectangular slots, S - shaped slot, two truncated slot and four circle slots in the ground plane, which fed by a 50 𝛺 coaxial probe, with over all area of 94*94 mm2. The software CST Microwave studio is used to build a simulation for the suggested antenna. The results of the simulation showed an impedance for bandwidth of 20 MHz between (1.56 GHz - 1.58 GHz) by using L1 band, while L2 band, it was 20 MHz between (1.21 - 1.23GHz). The results also showed that the circular polarization radiation can be obtained through a probe feeding at one of the diagonal lines of the patch. This antenna can reduce the loss in S11, impedance behavior, Gain and farfield radiation pattern.

Read Publication

A new method for hiding a secret file in several WAV files depends on circular secret key
Jul 19, 2022

Journal Egyptian Informatics Journal

publisher Elsevier

DOI https://doi.org/10.1016/j.eij.2022.06.003

Issue 4

Volume 23

The technique of information hiding is very important in achieving security of important and sensitive data, especially those that are transmitted through various digital communication channels because it has robust characteristics that distinguish it from encryption techniques, the most important of which is that it is not perceived by protrusive and hackers, as it is based on the principle of hiding those data inside other digital media as a carrier cover. On the other hand, with the development of hiding techniques, techniques developed to try extracting its hiding to hacking its contents, for this reason and to increase the efficiency of these methods, the encryption and hiding techniques was combined together. The proposed method depends on distributing secret data on several digital audio files of type WAV in random way depends on circular secret key values that is generated in random order that be agreed upon between the sender and the receiver. This technique has achieved high durability, and in the event of suspicion of the existence of secret content within any WAV file, the multiplicity of carrier files and their different length, as well as random distribution of data in them, all these characteristic eliminates the suspicion of any confidential content, as well as complicates the file retrieved process if the suspicion be occurs.

Read Publication

Medical Data Technology For Automatic Diagnosis System
Jun 14, 2022

Journal Journal of Positive Sciences (JPS)

publisher Mumbai: Ve Technology Pvt. Ltd

DOI doi.org/10.52688/12

Issue 12

Volume 2022

New industries utilising image processing technology in the medical business, notably for sickness detection, are emerging as a result of the popularity of image processing and its benefits. Grayscale images, such as X-rays and CT scans, provide a classification problem in medical applications since only grey channel information is available and no chronic information is available. A convolutional neural network (CNN) is utilised to detect breast cancer in this study, with huge coloured MRI images used to train the CNN model. Other models used were Random Forest, K-nearest Neighbour, and Nave Biase. CNN's cancer prediction accuracy of 95.12 percent may be maintained in the future.

Read Publication

Analysis and Implementation of the Authentication Protocol 802.1x
Dec 2, 2014

Journal International Journal of Computer Applications

DOI 10.5120/15200-3587

Issue 4

Volume 87

The security of wireless networks against hacker attacks depends on some parameters and special configurations. Authentication is considered as one of the most important security parameter in computer networks [1]. The communication for example between users through the internet must be authenticated by both sides in order to prevent hackers from pretending any one of them [2]. Authentication process has the function to allow or prevent users from accessing the wireless network like IEEE 802.11b or 802.11g, it can be applied also to wired networks [3]. IEEE 802.1X [4] is the famous standard which uses Extensible Authentication Protocol (EAP) to authenticate users before giving them access to the network [5]. The process of authentication is extended to include RADIUS protocol which is designed to authenticate remote users within special organizations, then upgraded to include most of the operating systems and computer networks. It is now the most famous and applicable protocol for authenticating remote users [6]. Recently, the operating system Android has dominated other operating systems, it is based on Linux core and has the capability to support 802.1x and other security protocols [7]. In this paper, 802.1x protocol is applied to authenticate users using windows 7 and Android operating systems, a comparison to show the main differences between them is introduced successfully in mixed (computer & mobiles) network.

Read Publication

Conferences

Conferences

Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA
Dec 10, 2023 - Dec 12, 2023

Publisher Baghdad Science Journal

DOI https://doi.org/10.21123/bsj.2024.10521

Country iraq

Location oman

Visit Conference

Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Oct 31, 2022 - Nov 1, 2022

Publisher IEEE

DOI 10.1109/ICCITM56309.2022.10031751

Country Iraq

Location Mosul

Visit Conference

Review of Encrypted Virus: Detection analyses Methods
Mar 19, 2021 - Mar 20, 2021

Publisher IEEE

DOI 10.1109/ICACCS51430.2021.9441915

Country India

Location Coimbatore

Visit Conference