[HTML][HTML] A comprehensive review of energy harvesting and routing strategies for IoT sensors sustainability and communication technology

HNS Aldin, MR Ghods, F Nayebipour, MN Torshiz - Sensors International, 2024 - Elsevier
The effectiveness and dependability of network communication within the Internet of Things
(IoT) depends on the energy-harvesting capabilities of IoT sensors. It is imperative to …

[PDF][PDF] Enhanced data security of communication system using combined encryption and steganography

HTS ALRikabi, HT Hazim - iJIM, 2021 - systems.uomisan.edu.iq
Data security has become a paramount necessity and more obligation in daily life. Most of
our systems can be hacked, and it causes very high risks to our confidential files inside the …

[PDF][PDF] A Novel Method of Multimodal Medical Image Fusion Based on Hybrid Approach of NSCT and DTCWT.

N Alseelawi, HT Hazim… - International Journal of …, 2022 - researchgate.net
The approach of multimodal medical image fusion, which extracts complementary
information from several multimodality medical pictures, is one of the most significant and …

[PDF][PDF] Secure Chaos of 5G Wireless Communication System Based on IOT Applications.

HTH ALRikabi, HT Hazim - International Journal of Online & …, 2022 - researchgate.net
This research is aimed at planning the manner in which the secure 5G communication can
be controlled based on traffic floods. To accomplish excellent administration execution of …

Digital forensics in cyber security—recent trends, threats, and opportunities

MI Alghamdi - Cybersecurity threats with new perspectives, 2021 - books.google.com
The rapid technological advancement has led the entire world to shift towards digital
domain. However, this transition has also result in the emergence of cybercrimes and …

[PDF][PDF] Dark web illegal activities crawling and classifying using data mining techniques

AHM Alaidi, M Roa'a, H ALRikabi, IA Aljazaery… - iJIM, 2022 - academia.edu
Dark web is a canopy concept that denotes any kind of illicit activities carried out by
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …

[PDF][PDF] Credit Card Fraud Detection Using Fuzzy Rough Nearest Neighbor and Sequential Minimal Optimization with Logistic Regression.

AS Hussein, RS Khairy… - … journal of interactive …, 2021 - pdfs.semanticscholar.org
The global online communication channel made possible with the internet has increased
credit card fraud leading to huge loss of monetary fund in their billions annually for …

[PDF][PDF] Face patterns analysis and recognition system based on Quantum Neural Network QNN

HTS ALRikabi, IA Aljazaery, JS Qateef, AHM Alaidi… - iJIM, 2022 - academia.edu
The past few years have witnessed a huge increase in the application of facial recognition,
detection, and analysis technology. However, face recognition systems remain the most …

The interactive role using the Mozabook digital education application and its effect on enhancing the performance of eLearning

DAR Al-Malah, SI Hamed, H Alrikabi - International Journal of …, 2020 - learntechlib.org
The study examined the impact of the use of the Mozabook application for digital education
in enhancing the performance of electronic-learning to ensure strategic educational success …

[PDF][PDF] Using modern education technique in Wasit university

A Alaidi, O Yahya, H Alrikabi - 2020 - learntechlib.org
This New learning educational methods, which depending on Learning Management
System (LMS), have been used by universities in the top education universities in the world …