Efficient breast cancer classification using LS-SVM and dimensionality reduction DOI
Amin Salih Mohammed

Soft Computing, Journal Year: 2023, Volume and Issue: unknown

Published: Oct. 6, 2023

Language: Английский

Design of Quantum Communication Protocols in Quantum Cryptography DOI
Bilal Alhayani, Omar A. AlKawak, Hemant B. Mahajan

et al.

Wireless Personal Communications, Journal Year: 2023, Volume and Issue: unknown

Published: July 18, 2023

Language: Английский

Citations

39

Optimization of Innovative Education Resource Allocation in Colleges and Universities Based on Cloud Computing and User Privacy Security DOI

Zhumei Ren

Wireless Personal Communications, Journal Year: 2023, Volume and Issue: unknown

Published: June 28, 2023

Language: Английский

Citations

11

RETRACTED ARTICLE: Efficient and economical smart healthcare application based on quantum optical neural network DOI
Tianyi Zhou,

T. Anuradha,

S. J. Mahendra

et al.

Optical and Quantum Electronics, Journal Year: 2024, Volume and Issue: 56(3)

Published: Jan. 27, 2024

Language: Английский

Citations

3

Bandwidth-Deadline IoT Task Scheduling in Fog–Cloud Computing Environment Based on the Task Bandwidth DOI

Naseem Adnan Alsamarai,

Osman N. Uçan,

Oras Fadhil Khalaf

et al.

Wireless Personal Communications, Journal Year: 2023, Volume and Issue: unknown

Published: July 10, 2023

Language: Английский

Citations

9

Information security for big data using the NTRUEncrypt method DOI Creative Commons
Mohammed Khalid Yousif, Zena Ez. Dallalbashi, Shahab Wahhab Kareem

et al.

Measurement Sensors, Journal Year: 2023, Volume and Issue: 27, P. 100738 - 100738

Published: March 8, 2023

Cloud computing processes vast quantities of data and offers a variety flexible, secure, on-demand, cost-effective collaboration options for consumers. Due to the increasing prevalence hosted services, security has become an increasingly critical concern. Hadoop, engine at heart cloud computing, causes serious problems cloud. Any public, private, or hybrid environment can use this solution without any hassle (IaaS). Furthermore, it is compatible with majority computing's capabilities. Increase using NTRU encryption. This study made advantage (NTRUEncrypt) algorithms residing in Hadoop speed up file encryption decryption processes. If HDFS engaged Map Task, then will take care both Data on be kept private secure thanks proposed protection technique, which makes cryptography. Combining technique preexisting infrastructure web-based.

Language: Английский

Citations

6

Deep Learning Based COVID-19 Detection via Hard Voting Ensemble Method DOI Open Access

Asaad Qasim Shareef,

Sefer Kurnaz

Wireless Personal Communications, Journal Year: 2023, Volume and Issue: unknown

Published: May 10, 2023

Language: Английский

Citations

5

Efficient detection of refugees and migrants in Turkey using convolutional neural network DOI

Talib Muhsen Elebe,

Sefer Kurnaz

Physical Communication, Journal Year: 2023, Volume and Issue: 59, P. 102078 - 102078

Published: April 13, 2023

Language: Английский

Citations

4

Independent Video Steganalysis Framework Perspective of Secure Video Processing DOI Creative Commons

Bilal A. Ozturk

Deleted Journal, Journal Year: 2024, Volume and Issue: 20(6s), P. 2541 - 2549

Published: May 2, 2024

We have designed an algorithm of cross-domain feature set extraction for video steganalysis steganography in multiple domains. For steganography, we implemented the recently proposed methods such as PMs, MVs, and IPMs. The outcomes these techniques fed input to Steganalysis approach. a technique which global is extracted according common statistical properties. After features, domain-specific features been local set. Both are form technique. classification has performed by using conventional machine learning classifiers Support Vector Machine (SVM) Artificial Neural Network (ANN).

Language: Английский

Citations

1

System Design and Implementation for Machine Learning and Internet of Things Based Anomaly Detection in Patient Movement DOI Creative Commons

Qassim A. Al-Jarwany

Deleted Journal, Journal Year: 2024, Volume and Issue: 20(5s), P. 2216 - 2232

Published: April 13, 2024

Emerging trends in healthcare have seen an increased need for improved monitoring, and as a result, machine learning (ML) the Internet of Things been integrated to develop smart systems that can provide rapid accurate health assessments. With inclusive view on mobility anomaly detection patients, this paper aims improve hospital patient safety. Patients wear or place these things, IoT sensor network then gathers real-time motion data. The information is moved central server. system was taught part using large number normal abnormal movement It also shows way differentiate between common activities those might indicate ill health. comprises network, data processing unit, ML discovery module. There are sensors wide range Then, run through model captures spatial-temporal dependencies different sets based upon more sophisticated techniques like Naive Bayes Classifier. Where there abnormalities discovered after analyzing them, alert sent out; will help quick emergency response by saving lives even before diseases become last-stage acute conditions

Language: Английский

Citations

1

Improved airborne computer system strategy for swarm drones flying based on skybrush suite and inspired technique DOI Creative Commons
Mohammed Najm Abdullah,

Khulood E. Dagher,

Sondous Sulaiman Wali

et al.

Measurement Sensors, Journal Year: 2023, Volume and Issue: 27, P. 100766 - 100766

Published: May 26, 2023

In airborne swarm drones, there are a significant impact on daily life as result of air advances in electronic communications. There different types UAVs (Unmanned Air Vehicles) being developed possible. this research, the ARDUPILOT or so-called ARDUCOPTER is simulated firmware with MAV link (Micro Vehicle Communication Protocol) that connected to Skybrush through communication layer. Where drones consisting 20 was studied and 3D displays were created taking into account frequency 2.4 GHz distance between avoid collisions occur paths by using PSO (Particle Swarm Optimization) algorithm which happens drones. The trajectory drone 5493 number ports 9195 obtained from proposed system.

Language: Английский

Citations

3