Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

G Ali, MM Mijwil - Mesopotamian Journal of …, 2024 - journals.mesopotamian.press
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in
transformative advances and promising enhanced patient care, operational efficiency, and …

Towards trustworthy AI-empowered real-time bidding for online advertisement auctioning

X Tang, H Yu - ACM Computing Surveys, 2022 - dl.acm.org
Artificial intelligence-empowred Real-Time Bidding (AIRTB) is regarded as one of the most
enabling technologies for online advertising. It has attracted significant research attention …

[HTML][HTML] Impact of perceived privacy and security in the TAM model: The perceived trust as the mediated factors

Y Zhang - International Journal of Information Management Data …, 2024 - Elsevier
Purpose Scholarly literature and industrial evidence imply how to improve face recognition
technology. However, given the relative novelty of the influence on consumers'(users) …

Innovative livestock: A survey of artificial intelligence techniques in livestock farming management

MM Mijwil, O Adelaja, A Badr, G Ali… - Wasit Journal of …, 2023 - wjcm.uowasit.edu.iq
Modern technology has recently become a meaningful part of all life sectors, as software,
sensors, smart machines, and expert systems are successfully integrated into the physical …

A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records

S Alsubai, A Alqahtani, H Garg, M Sha… - Complex & Intelligent …, 2024 - Springer
Electronic health records (EHRs) are important for the efficient management of healthcare
data. However, Healthcare data travels across an open route, ie, the Internet, making EHR …

[HTML][HTML] Towards unbalanced multiclass intrusion detection with hybrid sampling methods and ensemble classification

Y Shin, M Kim, H Kim - Applied Soft Computing, 2024 - Elsevier
Abstract Intrusion Detection Systems (IDS) play a crucial role in securing computer networks
against malicious activities. However, their efficacy is consistently hindered by the persistent …

Hybrid Spotted Hyena based Load Balancing algorithm (HSHLB)

RA Hasan, MM Akawee, EF Aziz… - … Journal of Big Data, 2024 - mesopotamian.press
In this paper, we delve into the core of our proposed dynamic load balancing mechanism,
the Hybrid Spotted Hyena based Load Balancing algorithm (HSHLB). We begin by …

Potential Impacts of Artificial Intelligence (AI) in Biotechnology.

A Gomes, B Gonçalves, B Inglês… - Applied Sciences …, 2024 - search.ebscohost.com
The impact of artificial intelligence (AI) in biotechnology has become increasingly significant,
driving advancements across multiple subfields in several areas of science. The demand for …

Mapping Web Service Characteristics to Queueing Theory Models for Performance Analysis

RA Hasan, OI Obaid… - Babylonian …, 2024 - journals.mesopotamian.press
The article presents a comprehensive analysis of mapping the characteristics of Web
services to queueing theory models, specifically the M/M/1 queueing model. The authors …

Analysis and prediction of evaporation rates using random forest models: a case study of Almaty city

HK Al-Mahdawi, H Alkattan, AA Subhi… - … Journal of Machine …, 2023 - mesopotamian.press
Abstract In this study, Climate Research Unit (CRU) data crossing from 1901 to 2022 was
utilized to analyze and predict evaporation rates in Almaty, Kazakhstan. The data was …