- Network Security and Intrusion Detection
- Artificial Intelligence in Healthcare
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Artificial Intelligence in Healthcare and Education
- Privacy-Preserving Technologies in Data
- AI in Service Interactions
- Adversarial Robustness in Machine Learning
- COVID-19 diagnosis using AI
- Reliability and Maintenance Optimization
- Information and Cyber Security
- Cloud Computing and Resource Management
- Artificial Immune Systems Applications
- Blockchain Technology Applications and Security
- Security in Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Water Quality Monitoring Technologies
- Data Stream Mining Techniques
- FinTech, Crowdfunding, Digital Finance
- Blockchain Technology in Education and Learning
- Machine Learning in Healthcare
- Optimization and Mathematical Programming
- IoT and Edge/Fog Computing
- Big Data and Business Intelligence
- Cloud Data Security Solutions
Iraqi University
2020-2024
Imam Ja’afar Al-Sadiq University
2024
Alsalam University College
2020-2022
Universiti Malaysia Pahang Al-Sultan Abdullah
2020-2021
ChatGPT is a large language model developed by OpenAI. It trained on dataset of conversational text and can be used to generate human-like responses prompts in variety languages formats. for tasks such as chatbots, translation, completion. The role based given prompt or context. applications completion, question answering. Additionally, it fine-tuned specific generating product descriptions summarizing articles. also creative writing poetry stories. integrated into wide range industries from...
ChatGPT, the cutting-edge language model developed by OpenAI, is one of most exciting advancements in field artificial intelligence. With its ability to generate human-like text and respond complex questions, ChatGPT has already made a significant impact poised continue rapid progression coming years. As we look future large models, there are many possibilities open opportunities for this technology enhance our lives change way interact with
Transfer Learning[1] is a machine learning technique that involves utilizing knowledge learned from one task to improve performance on another related task. This approach has been widely adopted in various fields such as computer vision, natural language processing, and speech recognition. The goal of this paper provide an overview transfer its recent developments. particularly useful situations where there limited labeled data available for the target In these cases, model can leverage with...
As it tries to incorporate computer-based technology into the public services provided by businesses or organisations, digital transformation process is currently regarded one of most prominent topics in circulation. Establishing fundamentals and points necessary for transformation, as relying on a specific set employee talents actively incorporating customers process's evolution. Cybersecurity has become an increasingly important issue governments worldwide, this shift towards top priority...
To create a completely immersive, highly spatiotemporal, and self-sustaining virtual shared place for humans to play, work, interact, the Metaverse is an emerging paradigm of next-generation Internet. transitioning from science fiction near-future reality thanks recent developments in new technologies like extended reality, artificial intelligence, blockchain.In this study, we investigate Metaverse, shared, fully immersive environment that could serve as model Internet’s future generation....
Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), support vector machine (SVM) have been used IDS in last decades.However, these classifiers is not working well if they applied alone without any other algorithms that can tune parameters or choose best sub set features problem.Such C SVM gamma which effect performance tuned well.Optimization...
Alfa Company is a medium-sized Iraqi distributor of laboratory equipment and supplies; in this study, we analyze their experience with implementing an automated inventory management system. This research explains the potential benefits implementation challenges such system for small businesses. Improved tracking, less storage fees, happier consumers resulted from adopting However, was complex time-consuming, requiring expertise outside IT consultants as well training internal staff. case...
Internet of Medical Things (IoMT) environments introduce vast security exposures including vulnerabilities to data poisoning threats that undermine integrity automated patient health analytics like diagnosis models. This research explores applying trustworthy artificial intelligence (AI) methodologies explainability, bias mitigation, and adversarial sample detection substantially enhance resilience medical intrusion systems. We architect an integrated anomaly detector featuring purpose-built...
Arabic, known for its rich morphological and syntactic complexity, poses significant challenges natural language processing technologies. This study presents a comparative evaluation of two artificial intelligence tools, ChatGPT Cloude, in their abilities to parse Arabic sentences accurately. Five embodying diverse linguistic features were selected, the parsing outputs evaluated by three experts. The results revealed clear performance gap, with Cloude outperforming overall accuracy (72.9%...
This work presents a novel method for securing federated learning in healthcare applications, focusing on skin cancer classification. The suggested solution detects and mitigates data poisoning attacks using deep CNN architecture, specifically VGG16. In architecture with ten institutions, the approach ensures collaborative model training while protecting sensitive medical data. Data is meticulously prepared preprocessed Skin Cancer MNIST: HAM10000 dataset. uses VGG16's powerful feature...
Heart disease is the leading cause of death in developed countries, as it causes many deaths annually. Despite availability effective treatments, heart remains a significant challenge to public health, so early detection essential enhancing patient outcomes and reducing mortality. Artificial intelligence seeks help physicians make right decisions about patient's health condition. In this regard, authors decided utilize machine learning techniques (k-nearest neighbor, decision tree, linear...
Cybersecurity is always evolving, and the year 2024 will present new challenges but also opportunities. As such, this editorial paper aims to discuss major phenomena in that field, which are a key element of modern cybersecurity concerns. This part such vital complexity these matters deserves further consideration, besides hoping comprehensive presentation inspire other scholars professionals do their best move forward with research. The future being shaped by trends as complex role AI cyber...
Abstract Machine learning (ML) and deep (DL) techniques have demonstrated significant potential in the development of effective intrusion detection systems. This study presents a systematic review utilization ML, DL, optimization algorithms, datasets research from 2018 to 2023. We devised comprehensive search strategy identify relevant studies scientific databases. After screening 393 papers meeting inclusion criteria, we extracted analyzed key information using bibliometric analysis...
Many optimisation-based intrusion detection algorithms have been developed and are widely used for identification. This condition is attributed to the increasing number of audit data features decreasing performance human-based smart systems regarding classification accuracy, false alarm rate, time. Feature selection classifier parameter tuning important factors that affect any system. In this paper, an improved algorithm multiclass was presented discussed in detail. The proposed method...
Intrusion detection is mainly achieved by using optimization algorithms. The need for algorithms intrusion necessitated the increasing number of features in audit data, as well performance failure human-based smart system (IDS) terms their prolonged training time and classification accuracy. This article presents an improved technique binary classification. proposal a combination different optimizers, including Rao algorithm, extreme learning machine (ELM), support vector (SVM), logistic...
This systematic literature review scrutinizes the landscape of research at intersection federated learning, big data processing, and poisoning attacks. Employing a meticulous search strategy across multiple databases, study unveils surge in annual scientific production, emphasizing growing interest learning related fields. However, critical gap becomes evident during investigation attacks specifically context when processing data. The most relevant keywords visually compelling word cloud...
Advancements in Artificial Intelligence (AI) and emerging generative capabilities added paradoxical aspects. One aspect is its positive impact limitless power it brings to users. On the other hand, concerns about misuse of this powerful tool have consistently increased [1]. AI advancements affect all domains sectors as they evolve their applicable nature applied sciences. The more influence has on model workflow within specific domain field [2]. This dual ignited a wide discussion...
Large language models (LLMs) have become prominent tools in various domains, such as natural processing, machine translation, and the development of creative text. Nevertheless, order to fully exploit capabilities Language Models, it is imperative establish efficient communication channels between humans machines. The discipline engineering involves creation well-constructed informative prompts, which act a crucial link human intention execution tasks by present study examines concept rapid...
This bibliometric analysis provides a comprehensive exploration of decision-making research within the field civil engineering, utilizing exclusive data derived from authoritative sources. Scrutinizing influential authors, recurrent keywords, and trend topics, study unravels complexities underlying processes in this dynamic discipline. Prolific contributors, including E.K. Zavadskas J. Wang, emerge as key influencers shaping discourse. Recurrent keywords such "decision making," "project...
With the use of AI models for real-time reception a feedback, this review attempts to show how assessment quality translation is changing. The investigation covers aspects such as technical side integration, efficiency and minimization human errors, influence upon industry including its services, costs competitiveness so forth. User experience ethical issues, implementation barriers are addressed more holistic view impacts assessment. discussion goes further addresses future it, possible...