Search Results - "2022 International Conference on Data Science and Intelligent Computing (ICDSIC)"

Refine Results
  1. 1

    Performance Analysis for Load Balancing Algorithms using POX Controller in SDN by Alrammahi, Maghrib Abidalreda Maky, Bhaya, Wesam S.

    “…Software-Defined Networking (SDN) makes network management simpler to configure, more flexible, and more secure than traditional methods. The primary objective…”
    Get full text
    Conference Proceeding
  2. 2

    An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction by Al-Janabi, Omar Mustafa, Ibrahim, Mohammed K., Kanaan-Jebna, Abdulkarim, Alyasiri, Osamah Mohammed, Aleqabie, Hiba J.

    “…In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of…”
    Get full text
    Conference Proceeding
  3. 3

    A Low Complexity Face Recognition System using Discrete Wavelet Transform and Distance Metrics by Mohammed, Marwah S., Farhan, Hameed R., Kod, Muayad S.

    “…Face recognition (FR) is a biometric technology used to identify persons according to their facial features. This study proposes an FR system that meets the…”
    Get full text
    Conference Proceeding
  4. 4

    XSS Detection Using Hybrid Machine Learning Methods by Albusalih, Nagham Kamil, Aljanabi, Rana Jumaa

    “…Nowadays, the increased use of Web services has resulted in a rise in the danger of web application attacks. These types of attacks are become more severe by…”
    Get full text
    Conference Proceeding
  5. 5

    Path Planning for an Autonomous Mobile Robot Using Red Fox Optimization Algorithm by Ketafa, Fetoh H., Al-Darraji, Salah

    “…Path planning is a key challenge in the study of autonomous mobile robots. This paper describes a new bio-inspired optimization method known as the Red Fox…”
    Get full text
    Conference Proceeding
  6. 6

    Comparative Analysis of Swarm Algorithms to Classification of covid19 on X-Rays by Issa, Abubakr S., Ali, Yossra H., Rashid, Tarik A.

    “…The use of Chest radiograph (CXR) images in the examination and monitoring of different lung disorders like infiltration, tuberculosis, pneumonia, atelectasis,…”
    Get full text
    Conference Proceeding
  7. 7

    Zone Protection and Faults Classification using Smart Microcontroller by Abdulameer, Ali H., Altahir, Ali A., Marei, Marwa M.

    “…This paper uses an intelligent relay based on a fuzzy logic algorithm to discuss the state of three-step zone protection and faults classification. The…”
    Get full text
    Conference Proceeding
  8. 8

    Investigation Malware Analysis Depend on Reverse Engineering by Ismael, Maher F., Thanoon, Karam H.

    “…Malware is constituted increasing number of hazards to people all around the world. Cybercrime is inextricably linked to today's expanding use of the internet…”
    Get full text
    Conference Proceeding
  9. 9

    Intelligent Drone-based IoT Technology for Smart Agriculture System by Al-Shareeda, Mahmood A., Manickam, Selvakumar, Saare, Murtaja Ali

    “…Drones and the Internet of Things (IoT) are two emerging technologies used in agriculture fields, which replace traditional farming practices with a modern era…”
    Get full text
    Conference Proceeding
  10. 10

    Quad-Tree Image Segmentation Technique with Encryption: A survey by Ibrahim, Sahaba Fuad, Abdul Wahab, Hala Bahjat, Jaber Almaaly, Abdul Mohssen

    “…Nowadays, in a wide range of computer technology applications, digital image processing methods are becoming more and more significant. Image segmentation is a…”
    Get full text
    Conference Proceeding
  11. 11

    Brain Stroke Segmentation Based on U-NET Algorithm by Jasim, Shahad Hussein, Haleot, Rafid A., Thajeel, Salam A.

    “…Image Segmentation is a crucial and highly significant technique to make it easier to define, characterize, and visualize regions of interest in any medical…”
    Get full text
    Conference Proceeding
  12. 12

    Intelligent Control for Obstacle Avoidance in the Self-Driving Car by Abd-Alrasool, Fatima M., Al-Moadhen, Ahmed A., Kamil, Haider G.

    “…The keys to autonomous car accident avoidance in crucial traffic settings are motion planning and tracker control. It necessitates not just system operation…”
    Get full text
    Conference Proceeding
  13. 13

    MRI-Brain Image Contrast Enhancement based on Comparative of Multiple Histogram Equalization Techniques by Farhood, Roaa Habeeb, Shaker, Shaimaa Hameed

    “…The poor image quality in Magnetic Resonance Imaging (MRI), notably lack of contrast between the tissues, artifacts inherent to these types of images, and…”
    Get full text
    Conference Proceeding
  14. 14

    Color Image Encryption Using S-Box Based on SHA-256 and Chaos Theory by Abduljaleel, Iman Qays, Abdullah, Sarah Mohammed

    “…Cryptography files can help prevent hackers from stealing encrypted information. On the other hand, current systems pose a high threat of security breaches or…”
    Get full text
    Conference Proceeding
  15. 15

    Robust Parameters for Conjugate Gradient Method in Unconstrained Optimization by Hassan, Basim A., Abdullah, Zeyad M., Hussein, Saif A.

    “…The conjugate gradient approach is used to resolve unrestricted optimization problems, uses the quadratic model for the objective function to generate a new…”
    Get full text
    Conference Proceeding
  16. 16

    An Intelligent Decision Support Model for Emergency Management in the Fog Computing Environment by Hussein, Oras Abdulkhdhur, Mousa, Ayad Hameed

    “…Numerous emergencies have happened recently on a worldwide scale, necessitating and occasionally requiring relevant decision-makers to focus excessively on the…”
    Get full text
    Conference Proceeding
  17. 17

    A Survey on Detecting Vandalism in Crowdsourcing Models by Mohammed Ali, Azha Talal, Alwan, Huda Fadhil, Al-Shakarchy, Noor Dhia

    “…Crowdsourcing is a common term for collaborative environments that include a group of workers participating in the content of these platforms to create…”
    Get full text
    Conference Proceeding
  18. 18

    DuaNet: A Novel Lightweight CNN Model for Classifying Five-class Lung Diseases by Al-Naqeeb, Duaa, Al-Shamma, Omran

    “…Lung diseases rank among the world's top killers and disablers. Therefore, early identification is crucial for improving long-term survival rates and boosting…”
    Get full text
    Conference Proceeding
  19. 19

    A New Convolution Neural Layer Based on Weights Constraints by Abbood, Elaf Ali, Al-Assadi, Tawfiq A.

    “…With the rapid development of artificial intelligence techniques, emerging deep neural networks (DNN) is one of the most effective ways to solve many…”
    Get full text
    Conference Proceeding
  20. 20

    Anomaly Detection of ECG Signals using Attention-derived Convolutional Long Short-term Memory by Hasan, Rawa Ali, Noor, Lamia Abed, Aaied, Ali

    “…An electrocardiogram (ECG) is a diagnostic procedure that measures electrical activity in the heart and helps doctors detect any irregularities. Early…”
    Get full text
    Conference Proceeding