Search Results - "2022 International Conference on Computer Science and Software Engineering (CSASE)"

Refine Results
  1. 1

    DDOS Attack Detection Using Lightweight Partial Decision Tree algorithm by Kareem, Mohammed Ibrahim, Jasim, Mahdi Nsaif

    “…Distributed Denial of service (DDoS) attacks are dangerous threats to networks that reduce the availability of Internet resources and services. The attacks are…”
    Get full text
    Conference Proceeding
  2. 2

    Performance Evaluation of RSA, ElGamal, and Paillier Partial Homomorphic Encryption Algorithms by Mohammed, Saja J., Taha, Dujan B.

    “…Information security has progressed dramatically over the past century because of the significant advancements in computer and communications research. As a…”
    Get full text
    Conference Proceeding
  3. 3

    Facial Expression Recognition using Transfer Learning and Fine-tuning Strategies: A Comparative Study by Abdulsattar, Nadia Shamsulddin, Hussain, Mohammed Nasser

    “…Facial expression recognition goes from laboratory-controlled to challenging in the wild due to various unconstrained situations. Due to human-computer…”
    Get full text
    Conference Proceeding
  4. 4

    Knee Osteoarthritis Detection Using Deep Feature Based on Convolutional Neural Network by Zebari, Dilovan Asaad, Sadiq, Shereen Saleem, Sulaiman, Dawlat Mustafa

    “…Various diseases have recently wreaked influence on people's way of life. Several bone illnesses significantly influence the quality of life, including Knee…”
    Get full text
    Conference Proceeding
  5. 5

    Sentiment analysis of Twitter data during Farmers' Protest in India through Machine Learning by Singh, Abhiraj, Kalra, Nidhi, Singh, Amritpal, Sharma, Seemu

    “…One of the most essential analysis methods is sentiment analysis using machine learning and tweets as data. The difficulty of performing sentiment analysis of…”
    Get full text
    Conference Proceeding
  6. 6

    Convolutional Neural Network GoogleNet Architecture for Detecting the Defect Tire by Sa'idah, Sofia, Fany, Andi, Suparta, I Putu Yowan Nugraha

    “…Defect tire detection plays a vital role in industrial quality checking. The system and manual human vision can automatically detect defective tires using…”
    Get full text
    Conference Proceeding
  7. 7

    A Lightweight Hybrid Cryptographic Algorithm for WSNs Tested by the Diehard Tests and the Raspberry Pi by Abdulhameed, Hudhaifa A., Abdalmaaen, Hadel F., Mohammed, Alhamzah T., Mosleh, Mahmood F., Abdulhameed, Ayoob A.

    “…Cryptographic techniques are crucial in ensuring the security of Wireless Sensor Networks data to limit the effect of such offensive operations. As a…”
    Get full text
    Conference Proceeding
  8. 8

    Software Development Effort Estimation Techniques Using Long Short Term Memory by Ahmad, Farah B., Ibrahim, Laheeb M.

    “…The Software Effort Estimation (SEE) process is used to predict the effort involved in developing a software project inaccuracy. This process permeates the…”
    Get full text
    Conference Proceeding
  9. 9

    Design and Analysis of Optical Frequency Comb Generator Employing EAM by Hammadi, Yousif I.

    “…Recently, there has been increasing interest in orthogonal flatted optical carriers employing an optical frequency comb generator (OFCG) driven by optical…”
    Get full text
    Conference Proceeding
  10. 10

    Suspicious Region Segmentation Using Deep Features in Breast Cancer Mammogram Images by Zebari, Dilovan Asaad, Ibrahim, Dheyaa Ahmed, Al-Zebari, Adel

    “…One of the most challenging processes in the image processing field is segmentation, especially region of the breast and Pectoral Muscle segmentation in…”
    Get full text
    Conference Proceeding
  11. 11

    Deep Learning Approach for Real-time Video Streaming Traffic Classification by Jameel, Mohammed Al, Turner, Scott, Kanakis, Triantafyllos, Al-Sherbaz, Ali, Bhaya, Wesam S.

    “…Video streaming services such as Amazon Prime Video, Netflix and YouTube continue to be of enormous demand in everyday peoples' lives. This enticed research…”
    Get full text
    Conference Proceeding
  12. 12

    Using Power Transformations in Response Surface Methodology by Al-Saffar, Avan, Mohammed Ali, Haithem Taha

    “…Response Surface Methodology (RSM) has succeeded in different scientific areas, such as engineering, pharmaceutics, agriculture, and living and chemical…”
    Get full text
    Conference Proceeding
  13. 13

    An Enhanced ElGamal Cryptosystem for Image Encryption and Decryption by Hussein, Haval I., Mstafa, Ramadhan J., Mohammed, Abdulhakeem O., Younis, Younis M.

    “…ElGamal cryptosystem is one of the well-known public-key algorithms for its ability to generate different ciphertexts for the same plaintext on successive…”
    Get full text
    Conference Proceeding
  14. 14

    Facial Emotion Classification of Multi-Type Datasets based on SVM Classifier by Vatcharaphrueksadee, Amornvit, Maliyaem, Maleerat, Viboonpanich, Rattikan, Phuangkamnerd, Suphot

    “…This paper presents an approach to using 2D images of stylized characters with annotated facial expressions and human facial expressions from the Facial…”
    Get full text
    Conference Proceeding
  15. 15

    Fractional Spline Model for Computing Fredholm Integral Equations by Qadir, Rahel J., Hamasalh, Faraidun

    “…The fractional cubic spline function will be used to solve the linear integral equation with fractional continuity conditions in this project. The Caputo…”
    Get full text
    Conference Proceeding
  16. 16

    Face Detection and Recognition Techniques Analysis by Hasan Alhafidh, Basman M., Hagem, Rabee M., Daood, Amar I.

    “…The face is one of the foremost widely physical attributes used in biometrics systems for human identification. Biometric authentication has gained a lot of…”
    Get full text
    Conference Proceeding
  17. 17

    Mind Controlled Educational Robotic Toys for Physically Disabled Children: A Survey by Khalid, Sibar Jameel, Ali, Ismael Ali

    “…Mind-controlled robotics can help people with disabilities to have a better life than ever. Childhood is the most enjoyable lifespan, which cannot be repeated…”
    Get full text
    Conference Proceeding
  18. 18

    Prioritization of Medical Data Transmission over IoT Environment by Yuvaraj, D., Priya, S.Shanmuga, Swaminathan, Subbiah, Sundaravadivel, P.

    “…With the recent enhancements in IoT networks, data access is performed quicker and faster. This leads to the adoption of this technology in various…”
    Get full text
    Conference Proceeding
  19. 19

    Design and Simulation of Intelligent Maximum Power Point Tracking (MPPT) based on Fuzzy Logic Controller for PV System by Jabber, Noor H., Ridha, Amel A., Al-Baghdadi, Maher A.R. Sadiq

    “…Photovoltaic systems are one of the most critical and clean renewable energy sources used in solar cells. Due to the increasing shortages of energy from other…”
    Get full text
    Conference Proceeding
  20. 20

    Several Predictions for Protein Secondary Structure by Multiple-Trained Hidden Markov Models by Qasim, Ahmed H., Hasan, Fatima M., Qasim, Omar S.

    “…Predicting the secondary structure of a protein is important in many fields of medicine and bioinformatics. Many researchers have tried to obtain the highest…”
    Get full text
    Conference Proceeding