research centers


Search results: Found 2

Listing 1 - 2 of 2
Sort by

Article
Path loss Optimization in WIMAX Network using Genetic Algorithm

Authors: Shahad Nafea --- Ekhlas Kadum Hamza
Journal: IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم ISSN: 18119212 Year: 2020 Volume: 20 Issue: 1 Pages: 24-30
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

The most necessary factors effect on the standard of broadband access services in mobile systems are WIMAX signal throughput and area coverage range. The environment controls are based on the sign power of any radio communication system. The sign power in any base station site relies on the space between the transmitter and the receiver, carrier frequency for the transmitter and the receiver along on the path loss. One of the most generally utilized experimental model to predict the path loss is the COST-231 Hata model. In this paper, the path loss rates have calculated based on the WIMAX criterion frequency at an area with 3.5GHz, that constant distances (7km) of transmitting base station into receive base station in urban, suburban environments. The execution of the COST-231 Hata paradigm and optimized paradigm are rated over the path loss. This model is optimized using Genetic Algorithm Technique using a computational tool MATLAB. Path loss results acquired show that the optimized paradigm rates a little higher than rates standard. The distance (7km)is good because of achieving the lowest value for path loss.


Article
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
استخدام الخوارزميات التطورية لتحليل انظمة التشفير غير الخطية

Authors: Faez Hassan Ali فائز حسن علي --- Riyam Noori Jawad ريام نوري جواد
Journal: Baghdad Science Journal مجلة بغداد للعلوم ISSN: 20788665 24117986 Year: 2020 Volume: 17 Issue: 2 Special Issue NICST Pages: 682-688
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream.

في هذا البحث، نتحرى عن استخدام الخوارزميات التطورية (EA's) لتحليل أحد أنظمة التشفير غير الخطية التي تعتمد على وحدة السجلات الزاحفة لتبادل البيانات الخطية (LFSR) باستخدام طريقة هجوم النص المشفر فقط. الخوارزمية الجينية (GA) و خوارزمية خلية النمل ((Ant Colony Optimization (ACO) التي استخدمت في مهاجمة أحد أنظمة التشفير غير الخطية المسماة "Shrinking Generator" باستخدام أطوال مختلفة من النص المشفر وأطوال مختلفة من LFSRs المدمجة أثبتت أدائها الجيد في إيجاد القيم الأولية لل LFSRs المدمجة.

Listing 1 - 2 of 2
Sort by
Narrow your search

Resource type

article (2)


Language

English (2)


Year
From To Submit

2020 (2)