Ahmed J. Obaid

ORCID: 0000-0003-0376-5546
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Artificial Intelligence in Healthcare
  • Blockchain Technology Applications and Security
  • Spam and Phishing Detection
  • COVID-19 diagnosis using AI
  • Internet of Things and AI
  • Brain Tumor Detection and Classification
  • Chaos-based Image/Signal Encryption
  • AI in cancer detection
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Smart Agriculture and AI
  • Video Surveillance and Tracking Methods
  • IoT-based Smart Home Systems
  • Big Data and Business Intelligence
  • Web Data Mining and Analysis
  • Advanced Steganography and Watermarking Techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Misinformation and Its Impacts
  • Artificial Intelligence in Healthcare and Education
  • Machine Learning in Healthcare
  • Cutaneous Melanoma Detection and Management
  • AI in Service Interactions
  • EEG and Brain-Computer Interfaces
  • Recommender Systems and Techniques

University of Kufa
2017-2025

Karary University
2024-2025

Thi Qar University
2022-2024

Al-Ayen University
2023-2024

National University of Science and Technology
2024

Ravenshaw University
2023

Haldia Institute of Technology
2023

M S Ramaiah University of Applied Sciences
2023

University of Calcutta
2023

Sharda University
2023

The ventilation systems are inadequate, the increase in amount of carbon dioxide and monoxide inner environment can damage human health. In addition, obtaining level external with excessive lead to unnecessary energy consumption. this study, a system that absorbs air from using dioxide, oxygen values ambient controls operation gives fresh is designed fuzzy logic method. overall purpose achieve ideal level. Two separate valves were controlled at same time control study. was created MATLAB...

10.1080/09720502.2020.1727611 article EN Journal of Interdisciplinary Mathematics 2020-05-18

A smart home personal assistant technology is an intrinsic system, which incorporates many elements such as users, Smart Home Personal Assistants (SPA) devices, cloud, skill provider and other responsive devices. Even though give a robust security privacy options, the devices face weaknesses, make system vulnerable can be comprised by adversaries, who capitalize on limitations to gain access delicate information of users. In this research, aim assess how invention innovation SPA harnessed...

10.54489/ijcim.v1i1.34 article EN International Journal of Computations Information and Manufacturing (IJCIM) 2021-12-19

Since the development of cloud computing, it has become a platform that is both efficient and effective for large businesses, firms, people to use in order share data. Cloud computing made possible several work together on When comes sharing data, customers storage services want be certain their information protected. Data owners would keep data while maintaining data's secrecy. They also provide access or supply decryption details users with whom they wish along option withdraw such at any...

10.1063/5.0185624 article EN AIP conference proceedings 2024-01-01

Abstract One of the potential top-level goals for 5G heterogeneous networks may be intellectual and perfect network which modifies consumer preferences in a proactive manner addition to needs channel. Research provides an interdisciplinary approach e-health, primarily concern BDA, radio space management inside various level fifth generation company massive data. The growing need usage big data fuelled digital transformation. research focuses on effect Big Data technologies during era. To...

10.1088/1742-6596/1963/1/012170 article EN Journal of Physics Conference Series 2021-07-01

INTRODUCTION: Covid-19 has exposed the necessitate for rapid acceptance of increasingly pioneering digital health technologies, especially remote monitoring. The revolution in Healthcare is dynamic ease use inexpensive concern solutions, enhancing patient care, reducing complications, improving effectiveness, and authorizing healthcare decision-makers with intelligence insight at point care.OBJECTIVES: primary objective this work to depict need recognize wearable sensors as a prerequisite...

10.4108/eai.15-7-2021.170296 article EN cc-by EAI Endorsed Transactions on Pervasive Health and Technology 2021-07-15

In recent years, the proliferation of fake accounts on social media has become a significant concern for individuals, organizations, and society. Fake play an important role in spreading news, rumors, spam, unethical harassment, other mischievous motives platforms. Detecting such manually is time-consuming challenging, especially with increasing sophistication methods used to create them. Therefore, there need automated approaches detect these accounts. This article aims reveal their...

10.1109/tcss.2023.3296837 article EN IEEE Transactions on Computational Social Systems 2023-08-07

The Internet of Things (IoT) comprises various smart devices for the sharing sensed data through online services. People will be directly contacted to check their health parameters and reports collected centrally devices. requirement is protection messages during exchange between sender receiver in order tackle human malicious attacks. Various signature-based schemes are discussed literature provide secure communication. Smart however require lightweight tasks by ensuring critical safety...

10.1016/j.jare.2020.08.015 article EN cc-by Journal of Advanced Research 2020-09-09

Deep fakes is the process of changing information image or video with different techniquesand methods that start humor and fun sometimes reach economic, political social goalssuch as counterfeiting, financial fraud impersonation. The data for this field still increasing at avery high rate. And therefore. combating exploring them a very difficult task.In paper, we conducted review previous studies what researchers dealt on thesubject deep fakes. Explain concepts deepfakes. Counterfeiting...

10.22075/ijnaa.2022.5580 article EN International journal of nonlinear analysis and applications 2022-01-01

The finite group M is an H-group if every subgroup in M-subgroup, and we say a j-group j-subgroup. In this study, look at some of the characteristics dihedral subgroups. As result, have student relationships between several subgroups, quantity demand investment research development, while other model focuses on more realistic relationship price.

10.47974/jdmsc-1553 article EN Journal of Discrete Mathematical Sciences and Cryptography 2023-01-01
Coming Soon ...