A review on fault detection and diagnosis techniques: basics and beyond

A Abid, MT Khan, J Iqbal - Artificial Intelligence Review, 2021 - Springer
Safety and reliability are absolutely important for modern sophisticated systems and
technologies. Therefore, malfunction monitoring capabilities are instilled in the system for …

[HTML][HTML] Comparative analysis of blockchain technology to support digital transformation in ports and ship**

DH Alahmadi, FA Baothman, MM Alrajhi… - Journal of Intelligent …, 2022 - degruyter.com
Blockchain is one of the technologies that can support digital transformation in industries in
many aspects. This sophisticated technology can provide a decentralized, transparent, and …

Examining multiple feature evaluation and classification methods for improving the diagnosis of Parkinson's disease

SA Mostafa, A Mustapha, MA Mohammed… - Cognitive Systems …, 2019 - Elsevier
An accurate diagnosis of Parkinson's disease by specialists involves many neurological,
psychological and physical examinations. The specialists investigate a number of symptoms …

[PDF][PDF] Black hole and sink hole attack detection in wireless body area networks

RK Dhanaraj, L Krishnasamy, O Geman… - … , Materials & Continua, 2021 - researchgate.net
In Wireless Body Area Networks (WBANs) with respect to health care, sensors are
positioned inside the body of an individual to transfer sensed data to a central station …

Smart home battery for the multi-objective power scheduling problem in a smart home using grey wolf optimizer

SN Makhadmeh, MA Al-Betar, ZAA Alyasseri, AK Abasi… - Electronics, 2021 - mdpi.com
The power scheduling problem in a smart home (PSPSH) refers to the timely scheduling
operations of smart home appliances under a set of restrictions and a dynamic pricing …

An adaptive protection of flooding attacks model for complex network environments

BA Khalaf, SA Mostafa, A Mustapha… - Security and …, 2021 - Wiley Online Library
Currently, online organizational resources and assets are potential targets of several types
of attack, the most common being flooding attacks. We consider the Distributed Denial of …

[PDF][PDF] Performance comparison between TCP and UDP protocols in different simulation scenarios

FT AL-Dhief, N Sabri, NMA Latiff, N Malik… - International Journal of …, 2018 - academia.edu
Abstract User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are a
transportation layer routing protocols which are considered of the core protocols of the …

[HTML][HTML] A reversible watermarking system for medical color images: balancing capacity, imperceptibility, and robustness

X Zhou, Y Ma, Q Zhang, MA Mohammed… - Electronics, 2021 - mdpi.com
The authenticity and integrity of medical images in telemedicine has to be protected. Robust
reversible watermarking (RRW) algorithms provide copyright protection and the original …

W-GeoR: Weighted geographical routing for VANET's health monitoring applications in urban traffic networks

P Singh, RS Raw, SA Khan, MA Mohammed… - IEEE …, 2021 - ieeexplore.ieee.org
Natural disasters like earthquakes and tsunami could destroy the existing infrastructure-
based communication system. IoT-based health monitoring is not possible in such …

Genetic case-based reasoning for improved mobile phone faults diagnosis

MA Mohammed, MK Abd Ghani, NA Arunkumar… - Computers & Electrical …, 2018 - Elsevier
Different types of fault diagnostic applications that utilize case-based reasoning (CBR) are
applied in the diagnosis process. However, CBR cannot provide solutions to unanticipated …