Papers by Mushtaq A. Hasson

Indonesian Journal of Electrical Engineering and Computer Science
As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-g... more As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on bur...
A major challenge in neural network is computationally and memory intensive. To solve this diffic... more A major challenge in neural network is computationally and memory intensive. To solve this difficult we explained deep neural network. In machine learning models, we explained and compared Deep Neural Networks (DNN’s) and Deep learning methods. This paper mainly contains the Deep Compression in three stages of pipeline. Such us trained quantization, Huffman coding and pruning. In this method, compressed the neural networks are done without affecting accuracy. The main aim is to maximize the energy and storage, and its required to run interprets on such large networks. Both compression and learning algorithms are discussed. We estimated the large scale deep neural network applications using multiple GPU machines. Various datasets are compared in this survey.

Indonesian Journal of Electrical Engineering and Computer Science, 2021
The wide use of vehicular ad hoc networks (VANETs) in the last decade hasled many researchers to ... more The wide use of vehicular ad hoc networks (VANETs) in the last decade hasled many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In thispaper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography hash function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance ...

An era of cloud computing which leads to quick growth and deployment of information technology, i... more An era of cloud computing which leads to quick growth and deployment of information technology, it has also commanded to worries that user's identity could be penetrated by the prohibited copying and modification of message exchanged between two entities (Sender and Receiver) inside cloud environment. There are several schemes in this field which suffered from many attacks such as dictionary, insider, and modification attacks. In order to enhance this state, we need a strong scheme to assurance and strengthen of user's message. In this paper, we propose a new scheme of message authentication code based on features extraction of user's fingerprint used to prove the integrity of user's message. Features are extracted from user's fingerprint to generate message code for each user's login and prevent malicious attacks such as Man-In-The-Middle (MITM), replay, and insider attacks. Additionally, our proposed scheme includes many security characteristics like user's message anonymity, data integrity for user's message, session key agreement, and one time message code for each user's session. The experimental results view the efficiency and sturdiness of ourproposed scheme.

Scientific Research Paper Ranking Algorithm PTRA: A Tradeoff between Time and Citation Network
Applied Mechanics and Materials, 2014
Most of the scientific research engines utilize the same way to rank scientific research papers (... more Most of the scientific research engines utilize the same way to rank scientific research papers (SRP), this way is highly depend on the citation network. The retrieved results of these engines for any keyword contain old papers with the highest citation value. In this paper, we proposed a new and easy to implement ranking algorithm for scientific research papers known as Paper Time Ranking Algorithm (PTRA). PTRA is a new ranking algorithm that depends on three factors to rank its results; paper age, citation index and publication venue. To construct and prove our ranking algorithm we created a web crawler that crawl different scientific search papers databases in the world to collect the information that PTRA needs. Unfortunately, some of this information was missing, such as, the impact factor of the journals. To collect this information, we created another crawler that search the Internet for these journals impact factors. However, to prove our ranking algorithm results, we have c...

Indonesian Journal of Electrical Engineering and Computer Science, 2022
In vehicular ad hoc networks (VANET), the privacy of vehicle data symbolizes a big challenge towa... more In vehicular ad hoc networks (VANET), the privacy of vehicle data symbolizes a big challenge towards malicious attacks. On the other side, vehicles in VANET can play a staple role in monitoring the environment by sensing the surrounding environment, compute the sensing information, and transfer the results if needed to the authorized party. Most of the modern VANETs systems encrypt the information to prevent hacking it but mostly neglect the decryption that occurred when data need to reprocessed. In this paper, we try to cover this weak point by using fully homomorphic encryption (FHE) because of its specifications. The proposed work focus on twofold: first, create secure authentication and permission management system. While the second is to preserve the privacy of vehicle data that transferred among VANET infrastructure. This scheme also deals with metric security features, such as data privacy, data integrity, and key management. In the experimental results, there is good advance in the fields of interest comparing with the related works.
Uploads
Papers by Mushtaq A. Hasson