Search Results - "Mohammad Aljanabi"

Refine Results
  1. 1

    Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime by Maad Mijwil, Mohammad Aljanabi, ChatGPT

    “…Today, cybersecurity is considered one of the most noteworthy topics that are circulated frequently among companies in order to protect their data from hacking…”
    Get full text
    Journal Article
  2. 2

    Metaverse: open possibilities by Mohammad Aljanabi, Sahar Yousif Mohammed

    “…To create a completely immersive, highly spatiotemporal, and self-sustaining virtual shared place for humans to play, work, and interact, the Metaverse is an…”
    Get full text
    Journal Article
  3. 3

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Ismail, Mohd Arfian, Ali, Ahmed Hussein

    “…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network…”
    Get full text
    Journal Article
  4. 4

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mezhuyev, Vitaly, Ismail, Mohd Arfian

    Published in Complexity (New York, N.Y.) (2020)
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. This condition is attributed to…”
    Get full text
    Journal Article
  5. 5

    SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs by Atheel Sabih Shaker, Omar F. Youssif, Mohammad Aljanabi, ZAINAB ABBOOD, Mahdi S. Mahdi

    “…The mobile wireless sensor network (WSN) is an emerging field as it widens the scope of applications where sensor networks can be applied. Generally, mobility…”
    Get full text
    Journal Article
  6. 6

    Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations by Issa, Melad Mohammed, Aljanabi, Mohammad, Muhialdeen, Hassan M.

    Published in Journal of intelligent systems (04-06-2024)
    “…Machine learning (ML) and deep learning (DL) techniques have demonstrated significant potential in the development of effective intrusion detection systems…”
    Get full text
    Journal Article
  7. 7

    Detecting Data Poisoning Attacks in Federated Learning for Healthcare Applications Using Deep Learning by Alaa Hamza Omran, Sahar Yousif Mohammed, Aljanabi, Mohammad

    “…This work presents a novel method for securing federated learning in healthcare applications, focusing on skin cancer classification. The suggested solution…”
    Get full text
    Journal Article
  8. 8

    Prompt Engineering: Guiding the Way to Effective Large Language Models by Mohammad Aljanabi, Mohanad Ghazi Yaseen, Ahmed Hussein Ali, Mostafa Abdulghafoor Mohammed

    “…Large language models (LLMs) have become prominent tools in various domains, such as natural language processing, machine translation, and the development of…”
    Get full text
    Journal Article
  9. 9

    Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises by Hayder Sabah Salih, Mohanad Ghazi, Mohammad Aljanabi

    “…Alfa Company is a medium-sized Iraqi distributor of laboratory equipment and supplies; in this study, we analyze their experience with implementing an…”
    Get full text
    Journal Article
  10. 10

    ChatGpt: Open Possibilities by Mohammad Aljanabi, Mohanad Ghazi, Ahmed Hussein Ali, Saad Abas Abed, ChatGpt

    “…ChatGPT-3 is a powerful language model developed by OpenAI that has the potential to revolutionize the way we interact with technology. This model has been…”
    Get full text
    Journal Article
  11. 11

    A Two-Stage Hybrid Approach for Phishing Attack Detection Using URL and Content Analysis in IoT by Yousif Mohammed, Sahar, Aljanabi, Mohammad, Mijwil, Maad M., Ramadhan, Ali J., Abotaleb, Mostafa, Alkattan, Hussein, Albadran, Zainalabideen

    Published in BIO web of conferences (01-01-2024)
    “…The goal of phishing assaults is to trick users into giving up personal information by making them believe they need to act quickly on critical information…”
    Get full text
    Journal Article
  12. 12

    Study the Field of View Influence on the Monchromatic and Polychromatic Image Quality of a Human Eye by Qasim, Adeeb Mansoor, Aljanabi, Mohammad, Kasim, Shahreen, Ismail, Mohd Arfian, Gusman, Taufik

    “…In this paper, the effect of the eye field of view (known as F.O.V.) on the performance and quality of the image of the human eye is studied, analyzed, and…”
    Get full text
    Journal Article
  13. 13

    Decision-making in Cybersecurity: A Bibliometric analysis by Aljanabi, Dr. mohammad

    “…This bibliometric analysis explores research trends and patterns in the intersection of decision-making and cybersecurity. Using Scopus data, we conducted a…”
    Get full text
    Journal Article
  14. 14

    Cloud Computing Issues, Challenges, and Needs: A Survey by Aljanabi, Mohammad, Abd-Alwahab, Shams N., Saedudin, RD Rohmat, Ebraheem, Hind Raad, Defni, -, Hadi, Ronal, Ismail, Mohd Arfian

    “…Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for…”
    Get full text
    Journal Article
  15. 15

    Large Dataset Classification Using Parallel Processing Concept by Aljanabi, Mohammad, Ebraheem, Hind Ra'ad, Hussain, Zahraa Faiz, Md Fudzee, Mohd Farhan, Kasim, Shahreen, Ismail, Mohd Arfian, Meidelfi, Dwiny, Erianda, Aldo

    “…Much attention has been paid to large data technologies in the past few years mainly due to its capability to impact business analytics and data mining…”
    Get full text
    Journal Article
  16. 16

    A Comparative Analysis of Machine Learning Algorithms for Classification of Diabetes Utilizing Confusion Matrix Analysis by Mijwil, Maad M., Aljanabi, Mohammad

    Published in Majallat Baghdād lil-ʻulūm (01-05-2024)
    “…يستخدم العاملين في الرعاية الصحية التعلم الآلي أكثر فأكثر في السنوات الأخيرة لتعزيز نتائج المرضى وخفض التكاليف عليهم. بالإضافة إلى ذلك، تم تنفيذ التعلم الآلي…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Exploring Advanced Analysis Technique for Shallow Water Flow Models with Diverse Applications by Hijaz Ahmad, Gamal M. Ismail, Ibrahim Alraddadi, Rasha F. El-Agamy, Mohammad Aljanabi, Umar Farooq

    “…The present article focuses on the analytical approach using fractional orders and its application in the dynamics of physical processes. Fractional order…”
    Get full text
    Journal Article
  19. 19

    Early Detection of Cardiovascular Disease Utilizing Machine Learning Techniques: Evaluating the Predictive Capabilities of Seven Algorithms by Maad Mijwil

    “…Heart disease is the leading cause of death in developed countries, as it causes many deaths annually. Despite the availability of effective treatments, heart…”
    Get full text
    Journal Article
  20. 20

    Enhancing Security and Privacy in Healthcare with Generative Artificial Intelligence-Based Detection and Mitigation of Data Poisoning Attacks Software by Mohialden, Yasmin Makki, Salman, Saba Abdulbaqi, Mijwil, Maad M., Hussien, Nadia Mahmood, Aljanabi, Mohammad, Abotaleb, Mostafa, Dhoska, Klodian, Mishra, Pradeep

    Published in Jordan medical journal (15-10-2024)
    “…This study investigated an advanced approach to enhancing security and privacy in healthcare by incorporating artificial intelligence (AI)-based strategies to…”
    Get full text
    Journal Article