A review on security analysis of cyber physical systems using Machine learning

AA Jamal, AAM Majid, A Konev, T Kosachenko… - Materials today …, 2023 - Elsevier
Abstract The concept of Cyber Physical System (CPS) is widely used in different industries
across the globe. In fact, it is the holistic approach towards dealing with cyber space and …

From personalized medicine to population health: a survey of mHealth sensing techniques

Z Wang, H Xiong, J Zhang, S Yang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Mobile sensing systems have been widely used as a practical approach to collect
behavioral and health-related information from individuals and to provide timely intervention …

Manufacturing intelligent Corvus corone module for a secured two way image transmission under WSN

B Alhayani, AA Abdallah - Engineering Computations, 2021 - emerald.com
Purpose The manufacturing of intelligent and secure visual data transmission over the
wireless sensor network is key requirement nowadays to many applications. The two-way …

RETRACTED ARTICLE: Visual sensor intelligent module based image transmission in industrial manufacturing for monitoring and manipulation problems

BSA Alhayani, H Llhan - Journal of Intelligent Manufacturing, 2021 - Springer
Due to technology advancement, smart visual sensing required in terms of data transfer
capacity, energy-efficiency, security, and computational-efficiency. The high-quality image …

The optimization efficient energy cooperative communication image transmission over WSN

ST Abbas, HJ Mohammed, JS Ahmed, AS Rashid… - Applied …, 2021 - Springer
We propose energy efficiency and quality-aware multi-hop one-way cooperative image
transmission framework based on image pre-processing technique, wavelet-based two …

WITHDRAWN: Detection of human genetic variation in VAC14 gene by ARMA-PCR technique and relation with typhoid fever infection in patients with gallbladder …

ZK Hanan, MB Saleh, EH Mezal, AT Jalil - 2021 - Elsevier
Withdrawal Notice WITHDRAWN: Detection of human genetic variation in VAC14 gene by
ARMA-PCR technique and relation with typhoid fever infection in patients with gallbladder …

[PDF][PDF] Best ways computation intelligent of face cyber attacks

B Alhayani, ST Abbas, DZ Khutar… - Materials Today …, 2021 - academia.edu
abstract The rising of information and communication technologies brought about new
challenges that need to be dealt with is the citizens' security is considered. Undoubtedly, the …

RETRACTED ARTICLE: The optimal project selection in portfolio management using fuzzy multi-criteria decision-making methodology

HJ Mohammed - Journal of Sustainable Finance & Investment, 2023 - Taylor & Francis
We, the Editors and Publisher of the Journal of Sustainable Finance and Investment, have
retracted the following articles which are all part of the Special Issue titled Accounting …

The critical human behavior factors and their impact on knowledge management system–cycles

AS Rashid, K Tout, A Yakan - Business Process Management Journal, 2021 - emerald.com
Purpose This study attempts to find out the impact of the human behavioral factors (HBFs)
including emotion, factors of deals with processes within and between groups as well as …

Compressive sensing chaotic encryption algorithms for OFDM-PON data transmission

T Wu, C Zhang, Y Chen, M Cui, H Huang, Z Zhang… - Optics express, 2021 - opg.optica.org
In this paper, we propose chaotic compressive sensing (CS) encryption algorithms for
orthogonal frequency division multiplexing passive optical network (OFDM-PON), aiming at …