An efficient deep learning approach to automatic glaucoma detection using optic disc and optic cup localization

M Nawaz, T Nazir, A Javed, U Tariq, HS Yong… - Sensors, 2022 - mdpi.com
Glaucoma is an eye disease initiated due to excessive intraocular pressure inside it and
caused complete sightlessness at its progressed stage. Whereas timely glaucoma screening …

[PDF][PDF] Comparison of meta-heuristic algorithms for fuzzy modelling of COVID-19 illness' severity classification

NAM Aseri, MA Ismail, AS Fakharudin… - … Journal of Artificial …, 2022 - researchgate.net
The world health organization (WHO) proclaimed the COVID-19, commonly known as the
coronavirus disease 2019, was a pandemic in March 2020. When people are in close …

Intelligent optimization for charging scheduling of electric vehicle using exponential Harris Hawks technique

R Devendiran, P Kasinathan… - … Journal of Intelligent …, 2021 - Wiley Online Library
The coordination of modern transportation system depends heavily on intelligent
techniques, information assortment, and its analysis. Sensors play a crucial role in …

[PDF][PDF] Breast cancer disease classification using fuzzy-ID3 algorithm based on association function

NF Idris, MA Ismail, MS Mohamad… - … Journal of Artificial …, 2022 - researchgate.net
Breast cancer is the second leading cause of mortality among female cancer patients
worldwide. Early detection of breast cancer is considerd as one of the most effective ways to …

Robust and efficient classification for underground metal target using dimensionality reduction and machine learning

Y Wan, T Li, P Wang, S Duan, C Zhang, N Li - IEEE Access, 2021 - ieeexplore.ieee.org
Underground metal target detection technology has been widely applied in industrial
production, resource exploration, and engineering construction, etc. However, due to the …

[PDF][PDF] User identification system for inked fingerprint pattern based on central moments

EJ Baker, SA Alazawi, NT Ahmed, MA Ismail… - Indonesian Journal of …, 2021 - academia.edu
The use of the fingerprint recognition has been and remains very important in many security
applications and licensing systems. Fingerprint recognition is required in many areas such …

An improved fish swarm algorithm to assign tasks and cut down on latency in cloud computing

RA Hasan, RAI Alhayali… - TELKOMNIKA …, 2022 - telkomnika.uad.ac.id
Various researches have been conducted to discover the machinery that led to the
evolvement of non-symmetric formation of groups by uncountable marine animals. The huge …

Distributed denial of service attack defense system-based auto machine learning algorithm

M Aljanabi, R Hayder, S Talib, AH Ali… - Bulletin of Electrical …, 2023 - beei.org
The use of network-connected gadgets is rising quickly in the internet age, which is
escalating the number of cyberattacks. The detection of distributed denial of service (DDoS) …

[PDF][PDF] Web application authentication using ZKP and novel 6D chaotic system

SJ Mohammed, SA Mehdi - Indonesian Journal of Electrical …, 2020 - researchgate.net
Text password has long been a dominant approach to user authentication used by a huge
quantity of Internet services. Web applications are now widely used for the implementation of …

The effectiveness of big data classification control based on principal component analysis

MA Mohammed, MM Akawee, ZH Saleh… - Bulletin of Electrical …, 2023 - beei.org
Large-scale datasets are becoming more common, yet they can be challenging to
understand and interpret. When dealing with big datasets, principal component analysis …