Iot ddos attack detection using machine learning

MH Aysa, AA Ibrahim… - 2020 4th International …, 2020 - ieeexplore.ieee.org
The distribution strategy of a botnet mainly directs its configuration, installing a support of
bots for coming exploitation. In this article, we utilize the sources of pandemic modeling to …

A review of PAPR reduction techniques for UFMC waveform

FS Shawqi, L Audah, AT Hammoodi… - 2020 4th …, 2020 - ieeexplore.ieee.org
This paper addresses the usage of the Universal Filtered Multi Carrier (UFMC) band. UFMC
is a multicomponent network modulation technique (5G). In this paper we discuss the …

Wireless body region networks abnormality identification and energy saving a study

SMB Al-Sabti, AA Abdulateef, C Atilla… - 2020 4th …, 2020 - ieeexplore.ieee.org
Current advances in wireless body networking technologies help to escape any of the
healthcare industry-related problems. Wearable biomedical devices and their related …

A semantic segmentation method for remote sensing images based on the Swin transformer fusion Gabor filter

D Feng, Z Zhang, K Yan - Ieee Access, 2022 - ieeexplore.ieee.org
Semantic segmentation of remote sensing images is increasingly important in urban
planning, autonomous driving, disaster monitoring, and land cover classification. With the …

MPFFNet: LULC classification model for high-resolution remote sensing images with multi-path feature fusion

H Yuan, Z Zhang, X Rong, D Feng… - International Journal of …, 2023 - Taylor & Francis
ABSTRACT Land Use/Land Cover (LULC) classification has become increasingly important
in various fields, including ecological and environmental protection, urban planning, and …

Design of health care monitoring system based on internet of thing (IOT)

TH Abdulameer, AA Ibrahim… - 2020 4th International …, 2020 - ieeexplore.ieee.org
The Internet has made this place a worldwide city and web of things (IoT) by allowing the
range of captors and keen items to collect and process data for various use. In weakening …

A lightweight image encryption and blowfish decryption for the secure internet of things

MJ Saddam, AA Ibrahim… - 2020 4th International …, 2020 - ieeexplore.ieee.org
As an innovative technology of the future, the Internet of Things (IoT) is expected to connect
billions of users. Increased connectivity is expected to generate mountains of data and data …

Design a Bidirectional DC/DC Converter for Second-Level Electric Vehicle Bidirectional Charger

AH AlMarzoogee… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Electric Vehicle (EV) has derived into consideration within automotive manufacturing over
the last centuries. The charger of EV contributes significant part in the growth of EV. This …

Image Super-Resolution Using Sparse Representation And Novelty Noise Removal Super-Resolution

SH Ahmed, S Kurnaz… - 2020 4th International …, 2020 - ieeexplore.ieee.org
The reconstruction of a composite image with a super-resolution will produce a high-
resolution image from a low-resolution picture. Since the super-resolution problem is not …

Cloud Computing Security For Algorithms

AA Abdulateef, AH Mohammed… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Distributed computing (CC), without unequivocal and direct use oversight, gives the chance
of on request admittance to arrange framework, specifically to information handling and …