Preferred Language
Articles
/
lhfsNY8BVTCNdQwCn2Li
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials & Continua
A Technical Framework for Selection of Autonomous UAV Navigation Technologies and Sensors
...Show More Authors

View Publication
Scopus (29)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2017
Journal Name
Desalination And Water Treatment
Cadmium removal from simulated chloride wastewater using a novel flow-by fixed bed electrochemical reactor: Taguchi approach
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
5th International Conference On Biomedical And Health Sciences
Exploiting Vpusm 8 Lytic Phage for The Bio- Control of V. Cholerae: A Novel Approach Against Cholera in The Era of Antibiotic Resistance
...Show More Authors

Objective: The purpose of this study was to assess the effectiveness of Vibriophage Universiti Sains Malaysia 8 (VPUSM 8), a bacteriophage that destroys bacteria, in managing the proliferation of Vibrio cholerae, specifically the El Tor serotype, as an alternate therapeutic strategy. Methods: The study entailed subjecting water samples from Kelantan, Malaysia, to reproduce the natural circumstances that promote the growth of V. cholerae. Subsequently, the samples were contaminated with the V. cholerae O1 El Tor Inaba strain and treated using VPUSM 8. The study employed a controlled experimental design, wherein the samples were divided into three groups, each experiencing different treatment methods. Quantifying the number of colony-

... Show More
View Publication
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Network And Computer Applications
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu May 12 2022
Journal Name
Journal Of Economics And Administrative Sciences
Nonparametric Estimator (Histogram) For Estimating Probability Density Function: Nonparametric Estimator (Histogram) For Estimating Probability Density Function
...Show More Authors

 In this paper we introduce several estimators for Binwidth of histogram estimators' .We use simulation technique to compare these estimators .In most cases, the results proved that the rule of thumb estimator is better than other estimators.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
International Journal Of Vlsi Design & Communication Systems (vlsics)
SIMULTANEOUS OPTIMIZATION OF STANDBY AND ACTIVE ENERGY FOR SUB THRESHOLD CIRCUITS
...Show More Authors

Increased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 09 2024
Journal Name
Diagnostics
A Novel Hybrid Machine Learning-Based System Using Deep Learning Techniques and Meta-Heuristic Algorithms for Various Medical Datatypes Classification
...Show More Authors

Medicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep lea

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 05 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication