Yazar "Mohammed, A.H." seçeneğine göre listele
Listeleniyor 1 - 20 / 28
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Architecture, Protocols, and Applications of the Internet of Medical Things (IoMT)(Engineering and Technology Publishing, 2022) Askar, N.A.; Habbal, A.; Mohammed, A.H.; Sajat, M.S.; Yusupov, Z.; Kodirov, D.The Internet of Things (IoT) refers to the interconnected framework of web-connected objects that can collect and transfer information over a remote network without requiring any human intervention. The rapid progression in the development of IoT-based devices and their expansion towards making the medical care facility financially more savvy, proactive, and customized, has given rise to the development of the "Internet of Medical Things (IoMT)" that are assumed to function proactively in all domains of the healthcare industry. Within this framework, the IoMT-based healthcare system delivers various advantages, such as quick and unfailing treatment, enhanced communication, cost minimization, etc., through the exploitation of several new technologies. For instance, machine learning has significantly helped with the exploitation of various healthcare systems; fog computing not only minimises the cost of communication but also provides low latency; blockchain delivers its users a much better way of protecting sensitive and confidential information and data they possess. In this survey, a comprehensive elaboration of the IoMT-based healthcare systems based on modern technologies was conducted. This article describes various techniques and solutions of IoMT healthcare systems in the context of emerging technologies, and the related future trends and applications for a better understanding of how IoMT can enhance the healthcare industry now and in future. © 2022 Journal of Communications and 2022 by the authors.Öğe The Avoidance and Detection Function of Artificial Intelligence in Covid-19(Institute of Electrical and Electronics Engineers Inc., 2021) Abdulateef, A.A.; Mohammed, A.H.; Abdulateef, I.A.The whole planet today is having to fight COVID-19 with big obstacles. The COVID-19 influenced several countries around the world between December 2019 and the present day. Many organisations and scientists seek to find a vaccine and to minimize the spread of COVID-19. Artificial Intelligence is one technology that can successfully address this virus (AI). In the case of other pathogens, artificial intelligence performed very well and could help us cope with the virus COVID-19, too. It is the imagination and the information of the people who use it which will help to overcome this dilemma. In some previous instances AI played a major role in virus prevention and identification. We have an ability to detect certain aspects of the AI because of the COVID-19 crisis. Machine learning that an AI subclass is used to identify patterns and to plan valuable knowledge based on recorded data sets. At the point where used entirely, AI can exceed human efforts by speed and differentiate designs from knowledge previously ignored. However many correct and appropriate data are needed for effective implementation of AI systems. This paper discusses the AI's role in COVID-19 prevention and detection and examines numerous technological aspects of AI. This paper would also clarify where AI will contribute with likely solutions to stop the spread of COVID-19. © 2021 IEEE.Öğe Caching Strategies for the Metaverse: Taxonomy, Open Challenges, and Future Research Directions(International Federation of Engineering Education Societies (IFEES), 2024) Mohammed, A.H.; Alaidaros, H.; Salleh, F.; Sajat, M.S.; Ramaha, N.; Habbal, A.The metaverse, which is considered to be the next evolutionary stage of the Internet, has captured the attention of both academia and industry. Its primary goal is to establish a shared 3D virtual space that interconnects all virtual worlds through the Internet. In this shared space, users are represented as digital avatars, enabling them to communicate, interact with each other, and engage with the virtual environment as if they were in the physical world. However, realizing the full potential of the metaverse poses significant challenges, such as the requirement for higher throughput compared to current social VR platforms and the need to minimize latency to just a few milliseconds to uphold a truly immersive user experience. Caching is a critical aspect of optimizing data access on the current Internet, and it is equally crucial for addressing similar challenges in Web 3.0 and the metaverse. This paper explores different caching strategies suggested to address these challenges on the current Internet and assesses their potential relevance to the metaverse. Caching strategies are categorized into three groups: web caching, mobile caching, and Internet of Things (IoT) caching. Recent solu-tions are then examined to determine their relevance to the metaverse. Finally, the paper discusses open research challenges and potential future research directions in this domain. © 2024 by the authors of this article.Öğe Cloud Computing Security for Algorithms(Institute of Electrical and Electronics Engineers Inc., 2020) Abdulateef, A.A.; Mohammed, A.H.; Abdulateef, I.A.Distributed computing (CC), without unequivocal and direct use oversight, gives the chance of on request admittance to arrange framework, specifically to information handling and capacity limits. As of late, CC has emerged as a network of public and private server farms giving a typical online interface to customers. Edge registering is a developing model of figuring that takes handling and capacity closer to end-clients to build reaction times and capacity for reinforcement move. Versatile CC (MCC) pushes programming to cell phones by utilizing disseminated figuring. Registering and edge processing, in any case, are confronting security issues, including framework weaknesses and association identification, that quickly postpones figuring models' acknowledgment. The investigation of PC algo-lithms, which definitely create through training, is AI (ML). We assess security dangers, difficulties and arrangements that utilization at least one ML calculations in this examination report. In this report we have We study various AI calculations, including regulated, unattended, semi-administered, and improved learning, used to tackle cloud security issues. At that point we look at every innovation 's proficiency dependent on its properties, advantages and burdens. Besides, we have potential testing suggestions to stable CC models. © 2020 IEEE.Öğe Design a Bidirectional DC/DC Converter for Second-Level Electric Vehicle Bidirectional Charger(Institute of Electrical and Electronics Engineers Inc., 2020) Almarzoogee, A.H.; Mohammed, A.H.Electric Vehicle (EV) has derived into consideration within automotive manufacturing over the last centuries. The charger of EV contributes significant part in the growth of EV. This paper proposes DC/DC converter which can be integrated for application in second- level electric vehicle chartering. Further, the proposed converter is bidirectional, accomplished of delivering power from batteries to the grid which called vehicle-to-grid (V2G) applications. The DC-DC converter is molded by mixing buck and boost converters and accordingly it is capable to function in buck as well as boost methods in both ways (charging and discharging). Throughout charging (G2V) the voltage (Dc-link) is stepped to down by the DC-DC converter to battery volt age and delivers requisite charging current by current control (CC).This is buck process through charging. While V2G process the role of the DC-DC converter is to boost the battery voltage to deliver the dc link voltage. The converter is predictable to get high efficiency. © 2020 IEEE.Öğe Design and Development of Interconnected Renewable Energy Sources Focused on Grid Power Inverter Energy for Sustainable Development A Review(Institute of Electrical and Electronics Engineers Inc., 2020) Namaa, H.M.; Mohammed, A.H.; Raheem, S.A.; Taha, M.Y.; Ibrahim, A.A.Expanding energy request because of quick industrialization, ecological worries about creation reliant on petroleum derivatives, declining fossil energy assets, clog of the transmission organization and weakening specialized execution are the drivers behind the coordination of little inexhaustible dispersed age (DG) units and the change of existing energy. Changes frameworks into a rebuilt framework. Enhancing the specialized favorable circumstances offered by DG position is a known test to Distribution Network Operators (DNOs) for both fossil and sustainable power source based DGs, yet DG inexhaustible frameworks additionally have an assortment of energy quality (PQ) challenges. This article gives an exhaustive examination of energy quality difficulties with the momentum research case for GM regenerative frameworks network incorporation and related relief innovations. To start with, this article hypothetically underscores indicating all the significant energy quality difficulties related with matrix joining for sustainable power source, and second, an exhaustive investigation of all PQI advancements acquainted with date is definite, featuring future examination openings. Moreover, all significant energy quality issues and the effect of high infiltration of sustainable power source and relief advancements on energy quality were represented by recreating a lattice put together DG framework based with respect to PV in MATLAB/Simulink. This article is accepted to be extremely useful for scholastics just as industry experts to comprehend the ebb and flow PQ challenges, PQI advances, and future examination headings for sustainable power source advances. © 2020 IEEE.Öğe Design of Health Care Monitoring System Based on Internet of Thing (IOT)(Institute of Electrical and Electronics Engineers Inc., 2020) Abdulameer, T.H.; Ibrahim, A.A.; Mohammed, A.H.The Internet has made this place a worldwide city and web of things (IoT) by allowing the range of captors and keen items to collect and process data for various use. In weakening the physical structures of the digital shrewd (IoT) shrewd items become a definitive building. The IoT has a variety of applications, including social security. Different restore and post-operative information should be screened. The human services correspondence using the Web of Things (IoT) technique is adjusted to achieve the therapeutic parameters in the nearby and remote zones. In this paper, we use the remote health care system using advanced information technology and new communications developments and remote physiological measuring technology. The remote benefit services framework provides for the 'free welfare authorities' and 'remote long-term human services administrations' through an entire 'remote social insurance data stage' work instrument by way of coordinated terminal programming and improved social insurance modules. This would encourage the real-time activities of elderly citizens and monitor the healthcare system. The information gathered from various sensors is stored on a local server that connects people, physicians and practitioners to the right information at the time of an emergency. In this way, the framework could increase availability, productivity and reduce well-being costs in order to increase peace of mind and safety. I hope the design and implementation of this system will improve elderly health monitoring in future. © 2020 IEEE.Öğe Effects of Clem Cloud Based E-Learning Management System for Teaching A Review(Institute of Electrical and Electronics Engineers Inc., 2020) Raheem, S.A.; Mohammed, A.H.; Namaa, H.M.; Taha, M.Y.; Ibrahim, A.A.To address contemporary difficulties, global designers must be prepared in cutting edge learning conditions, aptitudes and expert information. Upheld by the United States Agency for International Development (USAID), the Build-IT program (Building University Learning, Industry, and Development through Innovation and Technology) expands on the wide capacities of the executing accomplice from ASU and assumes a key function as a pioneer chief. In gathering characters from different fields. An all around prepared designer can add to the economical advancement of a general public. So as to make a network focused training, an incorporated technique has been proposed in which an issue based learning strategy is investigated to apply specialized information. In accordance with this methodology, in the way we are proposing, mechatronics designing understudies originally needed to work with different understudies in the fields of hardware, programming, control mechanization, and mechanics, and afterward planned an open, interdisciplinary, incorporated educational program. By working together with peers in building up this hardware, understudies are better outfitted with explicit information. This cycle additionally causes understudies to feel certain about applying their imaginative thoughts while protecting the essential significance of the apparatus. A significant advantage of this methodology is that helping understudies defeat their issues all the while upgrades the specialist's activity in the public arena, in spite of losing a portion of the particular range of abilities. The current methodology, in view of exact investigations utilizing this open structure, shows that understudies in our program have adequate abilities to add to social accomplishments. At long last, the useful, ease, and instructive visual device made by the members shows the estimation of this multidisciplinary approach. © 2020 IEEE.Öğe Emotion Recognition of Humans using modern technology of AI: A Survey(Institute of Electrical and Electronics Engineers Inc., 2023) Alheeti, A.A.M.; Salih, M.M.M.; Mohammed, A.H.; Hamood, M.A.; Khudhair, N.R.; Shakir, A.T.This comprehensive investigation and evaluation of the subject matter of emotion recognition is presented, focusing on the broader implications for society at large. The study utilizes a thorough analysis of scholarly literature and practical observations to establish a theoretical framework that facilitates comprehension of the topic under investigation. The findings have considerable implications for future investigations and pragmatic applications. Emotion recognition holds immense importance in diverse domains such as human-computer interaction and healthcare. The analysis of techniques used for emotional recognition includes facial expression assessment, speech patterns analysis, physiological signal interpretation, music perception, and written expression evaluation. The study presents a comprehensive overview of research methodologies commonly used in emotion recognition, discussing datasets, feature extraction techniques, and classification algorithms. The analysis of challenges and limitations pertaining to emotion recognition systems, including privacy concerns, is also discussed. Performance evaluation is analyzed through various methods, including machine assessment and self-report. The significance of continued investigation within the domains encompassing data integration across diverse modalities, the creation of robust classification algorithms, and the exploration of the intricate connection between the brain and affective states is underscored. © 2023 IEEE.Öğe Energy Efficiency Performance For Next Generation Wireless Communications(Institute of Electrical and Electronics Engineers Inc., 2022) Ahmed, A.H.; Alrubaee, S.H.; Hasan, H.K.; Mohammed, A.H.The growth demand in wireless communication and its application leads to a great effort should be into researcher's consideration to meet the future requirement of wireless network architecture. It's expected that the traffic will reaches multiple of hundreds than this in nowadays and to increase the capacity of the network with high and efficient energy efficiency. This can be reached by the use of small cell configuration like micro and pico cells, and use massive MIMO (Massive Multiple-input Multiple-output) with low-cost components which are prone to hardware impairments. This configuration leads to high energy efficiency for large number of base stations and user density. This article focuses in simulating an area covered by random deployment of small cells to serve hundreds of users in the simulation area. The results show that the (Energy efficiency) decreases as the SINR values increases, which is why it is important to specify a target SINR; otherwise the energy efficiency maximizing operation point might be very spectrally inefficient, and the efficient energy can be greatly improved by increasing the base station density, meaning that small cells are a promising solution for maximal energy efficiency deployment. © 2022 IEEE.Öğe Hyperledger, Ethereum and Blockchain Technology: A Short Overview(Institute of Electrical and Electronics Engineers Inc., 2021) Mohammed, A.H.; Abdulateef, A.A.; Abdulateef, I.A.Blockchain is a tamper-proof distributed ledger for tracking public or private pair transactions in pair networks that can not be retroactively changed without modifying all corresponding network blocks. The Consensus Protocol upgrades a blockchain, which guarantees a sequential, unambiguous transaction ordering. Blocks ensure that the blockchain is integral and uniform across a network of distributed nodes. Different blockchain implementations use different consensus protocols. This paper offers a brief overview of the most important discrepancies between the Hyperledger Fabric and Ethereum distributed ledger technologies (DLT). © 2021 IEEE.Öğe Image Super-Resolution Using Sparse Representation and Novelty Noise Removal Super-Resolution(Institute of Electrical and Electronics Engineers Inc., 2020) Ahmed, S.H.; Kurnaz, S.; Mohammed, A.H.The reconstruction of a composite image with a super-resolution will produce a high-resolution image from a low-resolution picture. Since the super-resolution problem is not well answered, a narrow method of optimizing numeric algorithm is implemented to remove image noise. The total variation of the image is minimized subject to noise statistical constraints. The restrictions are imposed on the use of Lagrange multipliers. The solution is derived from the gradient projection method. It is the solution of a partial differential equation based on time based on several constraints described. As t - ?0o, the solution converges into a continuous image. It is a fast, relatively easy numerical algorithm. The measurements are typically state of the art with very noisy videos. The process is non-invasive, which gives straight boundaries to the picture. A first step to the transfer can be translated. level range of the normal image at a pace equivalent to the level curvature separate from the magnitude of the feature gradient, and a second stage for the return to the boundary point of the picture. © 2020 IEEE.Öğe Implementation a Various Types of Machine Learning Approaches for Biomedical Datasets based on Sickle Cell Disorder(Institute of Electrical and Electronics Engineers Inc., 2020) Dheyab, H.F.; Ucan, O.N.; Khalaf, M.; Mohammed, A.H.This paper presents implementation a various kinds of machine learning models to classify the dataset of sickle cell patients. Artificial intelligence techniques have served to strengthen the medical field in solving its problems and providing rapid technical methods with high efficiency instead of traditional methods that can be subject to many problems in diagnosis and to determine the appropriate treatment. The main objective of this study to obtain a highly qualified classifier capable of determining the suitable dose of the SCD patients from 9 classes. Through examining the techniques used in our experiment based on performance evaluation metrics and making sure that each model performs. We applied numerous models of machine learning classifiers to examine the sickle cell dataset based on the performance evaluation metrics. The outcomes obtained from all classifiers, show that the Naïve Bayes Classifier obtained poor results compared to other classifiers. While Levenberg-Marquardt Neural Network during the training phase obtained the highest performance and accuracy of 0.935222, AUC 0.963889. The test phase obtained an accuracy of 0.846444, AUC 0.871889. © 2020 IEEE.Öğe Internet of Things and Cloud Computing - A Review(Institute of Electrical and Electronics Engineers Inc., 2020) Taha, M.Y.; Kurnaz, S.; Ibrahim, A.A.; Mohammed, A.H.; Raheem, S.A.; Namaa, H.M.Digital networking has been a popular platform for Modern Socio-Physical Networks (CPSS) and the Internet of Things (IoT). However, the issue of how to maintain data transfer and storage protection at CPSS is a big concern that needs to be tackled. During the CPSS transport and storage process we must protect the security and privacy of user data and user identity. To deter users of IoT devices from leaking personal information during data analysis and the transition process, we present a thorough overview of the subject Computational Diffie-Hellman (CDH). © 2020 IEEE.Öğe IoT Ddos Attack Detection Using Machine Learning(Institute of Electrical and Electronics Engineers Inc., 2020) Aysa, M.H.; Ibrahim, A.A.; Mohammed, A.H.The distribution strategy of a botnet mainly directs its configuration, installing a support of bots for coming exploitation. In this article, we utilize the sources of pandemic modeling to IoT networks consisting of WSNs. We build a proposed framework to detect and abnormal defense activities. According to the impact of IoT-specific features like insufficient processing power, power limitations, and node density on the formation of a botnet, there are significant challenges. We use standard datasets for active two famous attacks, such as Mirai. We also used many machine learning and data mining algorithms such as LSVM, Neural Network, and Decision tree to detect abnormal activities such as DDOS features. In the experimental results, we found that the merge between random forest and decision tree achieved high accuracy to detect attacks. © 2020 IEEE.Öğe A Lightweight Image Encryption and Blowfish Decryption for the Secure Internet of Things(Institute of Electrical and Electronics Engineers Inc., 2020) Saddam, M.J.; Ibrahim, A.A.; Mohammed, A.H.As an innovative technology of the future, the Internet of Things (IoT) is expected to connect billions of users. Increased connectivity is expected to generate mountains of data and data protection can be a threat. Architectural tools, in principle, are smaller in size and low in strength. Due to their sophistication, traditional encryption algorithms are often computationally ineffective and require multiple rounds of coding, effectively wasting restricted device resources. But a less complex algorithm will jeopardize required honesty. In this article we propose a lightweight coding algorithm called Stable IoT (SIT). It is a 64-bit block encryption that requires a 64-bit key to encrypt data. Low complexity coding symmetry algorithm called Stable Power with Affine Shift. The coding component can be implemented using a simple syntax consisting of only basic mathematical operations (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This will help reduce the encoder, as the more complex key expansion method is only done in decryption. The purpose of this document is to conduct a security review and evaluate the performance of the proposed algorithm. The design of the algorithm is a combination of emotion and a unified switch-switch network. Simulation testing reveals that the algorithm provides adequate protection in only five rounds of encryption. The algorithm is hardware-implemented with a low-cost 8-bit microcontroller and the effects of code size, memory consumption, and encryption / decoding execution cycles are contrasted with reference encryption algorithms. © 2020 IEEE.Öğe Local Feature Methods Based Facial Recognition(Institute of Electrical and Electronics Engineers Inc., 2022) Talab, M.A.; Qahraman, N.A.; Aftan, M.M.; Mohammed, A.H.; Ansari, M.D.In both business and academics, 3D face recognition is a hot topic. This technology's wide range of uses and the natural recognition procedure make traditional 2D face recognition a superior choice. Additionally, 3D face recognition systems are able to successfully identify human faces even in low light and with varying facial postures and expressions, while 2D face recognition systems would have a tough time operating in these settings. Attempting to recognize faces based on their statistical distribution is pointless. Local traits may be used to identify these faces, though. It is hypothesized here that local feature-based face recognition may be achieved by acquiring local features and their dimensions. © 2022 IEEE.Öğe Network of Low Energy Adaptive Clustering Protocols(Institute of Electrical and Electronics Engineers Inc., 2020) Sahib, H.A.; Kurnaz, S.; Mohammed, A.H.; Sahib, Z.A.The principal challenge facing the researcher in a WSN (Wireless Sensor Network) is the battery life (node power). This article explores the general structure for a WN (Wireless Network) distributed multichip process. Block-based routing protocols such as the Adaptive Low Energy Block Hierarchy (LEACH), the Hybrid Energy Efficiency Protocol (HEEP), the Threshold Responsive Energy Efficiency Network (TEEN), and PEGASIS effectively control energy usage. However, in order to achieve better energy efficiency these procedures need to be closely examined and revised. The article focuses on the LEACH protocol, where the Cluster Head (CH) selection process is called 'round' (r). The setup process costs for each round and Network stable state. Based on the observation of LEACH and its derivatives, the researcher suggests a view focused on the Energy Model (EM). To balance power in the grid, EM is added to both CH and non-CH nodes. © 2020 IEEE.Öğe On the Performance of mm-Wave Massive MIMO Multi-Carrier Modulation Technique for Vehicle-to-Vehicle Communication(Institute of Electrical and Electronics Engineers Inc., 2022) Al-Heety, A.T.; Mohammed, A.H.; Hamood, M.A.; Abdullah, S.N.; Khalaf, Q.M.; Alkhateeb, I.I.It is expected that the 5G network will cover more eventualities than what present mobile communications systems can handle. One of the primary anticipated future services is vehicle-to-vehicle (V2V) communications, which have demanding requirements at millimeter wave band frequencies. Waveforms that are spectrally confined and scalable are required to make the greatest use of the frequency resources which are currently available without interfering with nearby nodes. A common method used to reduce out-ofband emission is the filtering of OFDM. The use of OFDM results in a high Out of Band and a high Peak to Average Power Ratio (PAPR). This boosts the chances of hiring additional multicarrier waveform varieties to improve the Orthogonal frequency-division multiplexing responses. A collection of data can be transmitted simultaneously over several narrow-band subcarriers using Multi-Carrier Modulation (MCM) methods. MCM was used in this investigation in four different ways to start examining the performance of a single-user preceded mm-Wave massive MIMO wireless advancement systems: orthogonal frequency-division multiplexing, simplified frequency division multiplexing, filter bank multicarrier, and universal filtered multicarrier. These multicarrier modulation techniques rely on symbol and subcarrier filtering to reduce the effect of cyclic prefixes on the bit error rate (BER) and throughput of OFDM. Additionally, the impacts of phase noise are tested, and it is demonstrated that QAM-FBMC is phase noise resilient. © 2022 IEEE.Öğe An Overview of OFDM-UWB 60 GHZ System in High Order Modulation Schemes(Institute of Electrical and Electronics Engineers Inc., 2020) Shawqi, F.S.; Audah, L.; Hamdi, M.M.; Hammoodi, A.T.; Fayyad, Y.S.; Mohammed, A.H.Advanced technology was needed for this within the cap of bandwidth, due to new developments in wireless networking and the increasing requirement of high data levels by consumers. One of the promising solutions is a system with 60 GHz Ultra-Wideband (UWB) that supports a data rate of up to 7 Gbps, considered 10 times faster than the Wi-Fi 802.11n data rate. The system uses advanced modulation modulations and coding systems called adaptive modulation and coding (AMC). However, inappropriate modulation level selection and coding rate can lead, in the event of radio frequency interference and a multi-way decline, to a low data rate. In fact, if non-optimum decoder due to the code's restriction duration was chosen, more output loss occurs. In this paper, we will present explain about the OFDM technology. Also, we will discuss 60 GHZ Frequency Band and all their advantage. So, we will explain the OFDM-UWB systems and convolutional coding and viterbi decoding. © 2020 IEEE.