- Caching and Content Delivery
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Nonlinear Differential Equations Analysis
- Energy Efficient Wireless Sensor Networks
- Advanced Data Storage Technologies
- Network Traffic and Congestion Control
- Artificial Intelligence in Healthcare
- Big Data and Business Intelligence
- Fractional Differential Equations Solutions
- Impact of AI and Big Data on Business and Society
- Internet Traffic Analysis and Secure E-voting
- Oil Spill Detection and Mitigation
- Digital Transformation in Industry
- Organizational and Employee Performance
- Advanced Wireless Network Optimization
- Telecommunications and Broadcasting Technologies
- Internet of Things and AI
- Advanced Malware Detection Techniques
- Distributed and Parallel Computing Systems
- Advanced Photocatalysis Techniques
Iraqi University
2024-2025
Al-Ayen University
2023-2025
University of Babylon
2016-2025
Thi Qar University
2023-2024
Northern University of Malaysia
2015-2017
Healthcare is one of the most vulnerable sectors cyber-attacks. As it continues to expand exponentially and moves digitally-enabled healthcare services, cyber-criminals are trying take advantage weaknesses security vulnerabilities correlated with these shifts. a result technical developments, multitude highly powerful risks such as Ransomware facing sector. cyber-attack targeting companies household users has increased lately due its productive results. It conflicts have significantly...
<p>The eardrum is one of the most important organs in body, and disorders such as infection or injury may affect proper functioning lead to hearing problems. In this paper, based on a real-world phenomena, we study some mathematical aspects an abstract fractional $ [\mathtt{p},\mathtt{q}] $-difference equation with initial conditions. Our value problem tries model vibrating by using newly defined Caputo-type $-derivatives two nonlinear single-valued set-valued structures. We obtain...
In this study, we prove the existence of a fixed point for Suzuki‐type δ ‐contraction, which is generalization ‐contraction and weak mappings. We theorem multivalued mappings satisfying in complete fuzzy metric spaces. Furthermore, some several results single establish examples that support our study. As an application, present uniqueness solution system functional equations dynamic programming.
Abstract The detection of hate speech (HS) in online platforms has become extremely important for maintaining a safe and inclusive environment. While significant progress been made English-language HS detection, methods detecting other languages, such as Bengali, have not explored much like English. In this survey, we outlined the key challenges specific to including scarcity labeled datasets, linguistic nuances, contextual variations. We also examined different approaches methodologies...
Abstract Recent years have witnessed a widespread interest in healthcare issues and the search for faster safer service patients. Electronic health record was established to provide advanced services. Researchers seek permanent simplified ways monitor patients remotely using remote patient monitors. One of these methods is use Internet Things (IoT) devices, where provider can remotely. However, with current centralized electronic system increase number IoT security privacy arisen, as some...
Forth Generation (4G) network support for wide geographical locations proves its use as a more advanced wireless technology. The Long-Term Evolution (LTE) is 4G mobile communications standard set by International Communication Union (ITU), specifically ITU Radio communication Sector (ITU-R). At the moment, video traffic and telecommunications grow under expansion of LTE, which considered actual motivating access technology network. Throughout deployment various transport protocols are...
Rule-based classification in the field of health care using artificial intelligence provides solutions decision-making problems involving different domains. An important challenge is providing access to good and fast facilities. Cervical cancer one most frequent causes death females. The diagnostic methods for cervical used centers are costly time-consuming. In this paper, bat algorithm feature selection ant colony optimization-based were applied on data set obtained from repository...
Pending Interest Table (PIT) in Named Data Networking (NDN) architecture is complex the forwarding operation both upload of packets and download packets. PIT considered useful for so many reasons centric-networking. These among other operations include: reducing bandwidth usage, communicating with no prior knowledge publishers subscribers, loop packet loss detection best security. However, despite numerous advantages PIT, hardware challenges, including are still crucial respect to NDN...
Recently, cloud computing has affected a large part of the computer industry, including software companies and internet service providers. It proven efficient in managing tasks for applications. Despite its popularity, does not meet requirements applications because it faces many limitations, such as high latency bandwidth bottlenecks. These limitations will significantly affect sensitive to delays. To this challenge, fog is introduced an extension computing. improves quality (QoS) that...
Electronic health records are essential and sensitive since they include vital information routinely exchanged across several parties, such as hospitals private clinics. This data must remain accurate, current, secret, available only to authorized parties. Integrating these improves the accuracy cost-effectiveness of present administration framework. Medical Records (EMRs) now kept utilizing structure clientserver via whom patient is maintained in hospital. Multiple use same database track a...
Currently, Machine Learning (ML) seems very attractive since it may speed up business functions in enterprises, lower costs for supplying goods and services, manage information to promote enterprise efficiency. Essential technological domains nowadays are the explosive period of growth solutions, which progressively used almost all platforms. The ML sessions will receive a thorough summary, relevant organizations be shown procedures processes. data management unit is already been striving...
In this study, a novel embedded machine learning (ML) framework was employed to analyze interfacial characteristics in dissimilar-alloy impact welding. While keeping the substrates constant, i.e., stainless steel and Ti alloy, influence of interlayer types on resultant morphology impact-welded bonds also highlighted. The dataset meticulously generated through numerical simulations, utilizing materials properties processing parameters as primary inputs. These inputs were used predict various...
The healthcare environment is one of the applications that require real-time monitoring to immediately process. Fog computing works in a and offers connected devices for processing data with low latency compared cloud model. Load balancing an important term fog avoids situations overload underload nodes. Many Quality Service (QoS) metrics such as cost, response time, throughput, resource utilization, performance can be improved by load balancing. In this paper, we proposed mechanism called...
<p>Communication by email is counted as a popular manner through which users can exchange information. The could be abused spammers to spread suspicious content the Internet users. Thus, need an effective way detect spam emails are becoming clear keep this information safe from malicious access. Many methods have been developed address such problem. In paper, machine learning technique applied emails. technique, detection system based on sequential minimal optimization (SMO) built...
Fourth Generation (4G) mobile systems has been used more widely than the older generations 3G and 2G. Among reasons are that 4G's transfer rate is higher it supports all multimedia functions. Besides, its' for wide geographical locus makes wireless technology gets advanced. The essential goal of 4G to enable voice-based communication being implemented endlessly. This study tries evaluate if old protocols suit with this new technology. And which one best performance greatest effect on...