Papers by Alaa Hamid Mohammed

2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2021
The technical term for body measurements and estimates is called biometrics. It refers to metrics... more The technical term for body measurements and estimates is called biometrics. It refers to metrics related to human characteristics. Biometrics classification is using in computer science as a form of identification and access control. Classification is one of the pattern recognition methods that consist of grouping similar data into classes. Automated personal identification using vascular biometrics. The Convolutional Neural Network (CNN) has demonstrated its remarkable ability to learn biometric traits that can provide a robust and accurate match. This thesis aims to develop a robust finger-vein identification system using CNN. Since finger vein lies under the human body, so they need Near Infrared (NIR) light and camera for acquiring, the finger-vein require spectrum light with the camera to capture. The capture images need to pass through several stages, including reprocessing, pattern extraction, and matching, to decide to get an individual ID. This research proposes an efficient deep learning model to build a robust finger vein identification system. After images pre-processing and vein pattern extraction, feature extraction and matching are performed by the proposed CNN model, which has one input layer and more than one hidden layer and one output layer. The first hidden layer is known as the convolution layer its plays the role of feature extraction and produces features map, followed by the pooling layer, which acts as a filter to remove unwilling features, and batch Normalization layer to speed up the training process. The system presented 99.78 % accuracy which is remarkable when compared with several researches.

Retinal Fundus Images Of Optical Disk Detection
2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
Optical circle identification (OD) is a significant advance in the programmed division and invest... more Optical circle identification (OD) is a significant advance in the programmed division and investigation of pictures of the retina. In this article, another approach is proposed for recognizing RE cutoff points from shading retinal fundus pictures. Morphological factors and differentiation improvement methods are utilized related to a Gaussian contrast (DOG) channel to acquire an OD limit. Our proposed calculation makes a high progress rate with comparative computational time. The exhibition of our proposed strategy was assessed on 1660 pictures addressing six freely accessible informational collections; STARE, DRIVE, ARIA, DIARETDB1, DIARETDB0, and MESSIDOR informational indexes. The trial results show that the pictures from the DRIVE, ARIA, DIARETDB1 and DIARETDB0 datasets have a 100% achievement rate, which is superior to the precision of the most recent age techniques, which is under 99% for the ARIA, DIARETDB1 and DIARETDB0 informational indexes. While coming to 98.8% and 99.83% for the STARE and MESSIDOR datasets individually, the calculation runs with a normal computational season of 1.2 seconds.

Performance Analyses of Channel Estimation and Precoding for Massive MIMO Downlink in the TDD System
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020
The fundamental limitation of massive MIMO technology is pilot contamination effect. This effect ... more The fundamental limitation of massive MIMO technology is pilot contamination effect. This effect occurs during uplink training when terminals use the same orthogonal signals. In this paper, a pilot reuse factor with large scale fading precoding is proposed to mitigate the pilot contamination effect. The pilot reuse factor is designed to assign unique orthogonal signals to the adjacent cells. These unique orthogonal signals are reused only within the cell and hence, intra-pilot contamination is the only concern. Large scale fading precoding is then used to mitigate the intra-pilot contamination effect. The average achievable sum rate is computed for different pilot reuse factors. Experimental results through MATLAB simulation show that a higher pilot reuse factor gives better average achievable sum rates.

Implementation a Various Types of Machine Learning Approaches for Biomedical Datasets based on Sickle Cell Disorder
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020
This paper presents implementation a various kinds of machine learning models to classify the dat... more This paper presents implementation a various kinds of machine learning models to classify the dataset of sickle cell patients. Artificial intelligence techniques have served to strengthen the medical field in solving its problems and providing rapid technical methods with high efficiency instead of traditional methods that can be subject to many problems in diagnosis and to determine the appropriate treatment. The main objective of this study to obtain a highly qualified classifier capable of determining the suitable dose of the SCD patients from 9 classes. Through examining the techniques used in our experiment based on performance evaluation metrics and making sure that each model performs. We applied numerous models of machine learning classifiers to examine the sickle cell dataset based on the performance evaluation metrics. The outcomes obtained from all classifiers, show that the Naïve Bayes Classifier obtained poor results compared to other classifiers. While Levenberg-Marqua...
Secure Pin Authentication in Java Smart Card Using Honey Encryption
2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2020
Java card is a system that can allow the programming and improvement of smart card technology by ... more Java card is a system that can allow the programming and improvement of smart card technology by incorporating the java language into a virtual machine, it also introduces the concept of applets as a mean of implementing various management and protection measures on the smart card data, but the java card system also introduces new security challenges to the stage, in this paper, we implement a security scheme based on the concept of honey encryption to overcome the threat of brute force attacks and denial of service attacks on the smart card password authentication.

Rayleigh Leistungs Relation and Rician Fading Channels in Qam Using Simulink Environment
2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2020
Blurring alludes to vacillations in signal quality when gotten on the collector and is characteri... more Blurring alludes to vacillations in signal quality when gotten on the collector and is characterized into two sorts as fast blurring and moderate blurring. The multipath spread of the transmitted sign, which causes quick blurring, is because of the three proliferation instruments depicted as reflection, diffraction, and dissipating. Different sign ways can once in a while be productively or annihilated at the beneficiary, causing the force level of the got sign to change. The front of the got signal for a fast blurring signal is said to follow the Rayleigh dissemination if there is no view between the transmitter and beneficiary and a Reyesy dispersion in the event that one of these ways is accessible. An examination of the exhibition of the Rayleigh and Reishi blurring directs in modifying the abundancy of the square utilizing the Simulink instrument was talked about in this venture, and the dispersed point chart is utilized to show the distinction between the transmit and get sign...
The Probe into Reflection Mobile Radio Propagation
2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2020
Versatile correspondence framework. Reflection happens when an electromagnetic wave faces an arti... more Versatile correspondence framework. Reflection happens when an electromagnetic wave faces an article a lot bigger than the recurrence of an electromagnetic wave. The quality picked up (or its extra catastrophe) is commonly the most significant parameter anticipated from enormous scope engendering models that rely upon the material study of reflection. In this article, we draw an end that isn't equivalent to topical posts. Trigonometric vectors from the vector E_TOT (d), the got vitality can be yield.

A Lightweight Image Encryption And Blowfish Decryption For The Secure Internet Of Things
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020
As an innovative technology of the future, the Internet of Things (IoT) is expected to connect bi... more As an innovative technology of the future, the Internet of Things (IoT) is expected to connect billions of users. Increased connectivity is expected to generate mountains of data and data protection can be a threat. Architectural tools, in principle, are smaller in size and low in strength. Due to their sophistication, traditional encryption algorithms are often computationally ineffective and require multiple rounds of coding, effectively wasting restricted device resources. But a less complex algorithm will jeopardize required honesty. In this article we propose a lightweight coding algorithm called Stable IoT (SIT). It is a 64-bit block encryption that requires a 64-bit key to encrypt data. Low complexity coding symmetry algorithm called Stable Power with Affine Shift. The coding component can be implemented using a simple syntax consisting of only basic mathematical operations (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This will help reduce the encoder, as the more complex key ex...

Design a Bidirectional DC/DC Converter for Second-Level Electric Vehicle Bidirectional Charger
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020
Electric Vehicle (EV) has derived into consideration within automotive manufacturing over the las... more Electric Vehicle (EV) has derived into consideration within automotive manufacturing over the last centuries. The charger of EV contributes significant part in the growth of EV. This paper proposes DC/DC converter which can be integrated for application in second- level electric vehicle chartering. Further, the proposed converter is bidirectional, accomplished of delivering power from batteries to the grid which called vehicle-to-grid (V2G) applications. The DC-DC converter is molded by mixing buck and boost converters and accordingly it is capable to function in buck as well as boost methods in both ways (charging and discharging). Throughout charging (G2V) the voltage (Dc-link) is stepped to down by the DC-DC converter to battery volt age and delivers requisite charging current by current control (CC).This is buck process through charging. While V2G process the role of the DC-DC converter is to boost the battery voltage to deliver the dc link voltage. The converter is predictable ...

A Review of PAPR Reduction Techniques for UFMC Waveform
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020
This paper addresses the usage of the Universal Filtered Multi Carrier (UFMC) band. UFMC is a mul... more This paper addresses the usage of the Universal Filtered Multi Carrier (UFMC) band. UFMC is a multicomponent network modulation technique (5G). In this paper we discuss the different modulation technologies for 5 G technology and support the need for UFMC technology in wireless 5 G communication. Some drawbacks such as lateral band leakage, high Peak to Average Power ratio (PAPR) and spectrum utilization are used to decreases the performance of the system in 4 G OFDM modulation technique. Though, with the introduction of Internet of Things (IOT) and the transition to user-centered computing, it is difficult to utilize the OFDM methodology. There are still some problems in realistic terms of a single-carrier strategy called filter bank multi carrier (FBMC) which is stronger than OFDM. And a switch to a separate strategy named Universal Filtered Multi Carrier (UFMC) is used due to efficient usage of the spectrum by considering the formats above. This article also explains the PAPR red...

A review on Queue Management Algorithms in Large Networks
IOP Conference Series: Materials Science and Engineering
The efficiency of Transmission Control Protocol (TCP) is significantly influenced by Congestion C... more The efficiency of Transmission Control Protocol (TCP) is significantly influenced by Congestion Control. Many scientists have widely researched and suggested several improvements to conventional TCP Congestion Control over the past centuries. This subject, however, still inspires scholarly and industrial research groups due to changes in demands for internet applications and the evolution of internet technologies. In this review paper, illustrate the most important features of the TCP and its mechanisms. The challenges and its effect on the performance of the network communication have also been explained. Several research groups have been working on the improvement of the quality of services of the network. This paper reviews some recent studies and argues their latest findings to have a better understanding. Where the important features of sub-sections of the TCP were presented. Then we showed the two main classes of the existing router queue management system. Performance metrics...

Performance Evaluation of Three Mobile Ad-hoc Network Routing Protocols in Different Environments
Mobile ad-hoc wireless networks give us the high probability and high properties to create networ... more Mobile ad-hoc wireless networks give us the high probability and high properties to create networks, without any central management or infrastructure, independent and temporary network, that is means wide ubiquitous networks. The intermediate nodes should be able to communicate between them to send and receive the data with ability using at any time and anywhere, the mobility of the intermediate node between the source and destination gives us unstable topology maybe the connection between the nodes will be break often. Therefore, the strategies to design any wireless depend on path routing and protocol selection. In this paper we study and evaluate the effect of mobility on the routing protocols DSDV, AODV and DSR in two different scenarios, the density of nodes and different area in NS2.35 simulation by using three performance metrics in the evaluating the routing protocols are Average Throughput, Packet Delivery Ratio and Average End-to-End Delay.

The Method Of Calibration Compensation For Fiber Nonlinearity- A Review
2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
Digital signal processing for compensation for fibre nonlinearity Is a key enabler of ever-greate... more Digital signal processing for compensation for fibre nonlinearity Is a key enabler of ever-greater demand higher data rates for unified optical transmissions. A big challenge to the existing techniques that is the nonlinear coefficient of fiber Must be properly scale-up during compensation In order to attain the achieveable improvement in signal quality. In this paper, we have reviewed several papers in Fiber Nonlinear using several algorithms as well as processing the signal transmitting This problem is adaptively optimized using a low-complexity algorithm A soft-decision, bitwise demodulator based metric used for modern applications Decoders from the FEC. The study demonstrates an optimal scaling factor analysis with predictable accuracy.

Network of Low Energy Adaptive Clustering Protocols
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
The principal challenge facing the researcher in a WSN (Wireless Sensor Network) is the battery l... more The principal challenge facing the researcher in a WSN (Wireless Sensor Network) is the battery life (node power). This article explores the general structure for a WN (Wireless Network) distributed multichip process. Block-based routing protocols such as the Adaptive Low Energy Block Hierarchy (LEACH), the Hybrid Energy Efficiency Protocol (HEEP), the Threshold Responsive Energy Efficiency Network (TEEN), and PEGASIS effectively control energy usage. However, in order to achieve better energy efficiency these procedures need to be closely examined and revised. The article focuses on the LEACH protocol, where the Cluster Head (CH) selection process is called "round" (r). The setup process costs for each round and Network stable state. Based on the observation of LEACH and its derivatives, the researcher suggests a view focused on the Energy Model (EM). To balance power in the grid, EM is added to both CH and non-CH nodes.
A Survey on Multi-Objective Harmony Search-Based Clustering and Characteristics in WSN
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
Advancements in Wireless Sensor Network (WSN) technology has allowed lightweight, inexpensive sen... more Advancements in Wireless Sensor Network (WSN) technology has allowed lightweight, inexpensive sensor nodes to track diverse physical and environmental environments, data, and so forth. Wireless correspondence, and delivery. The clustering of WSNs has proved to be an efficient method for enhancing data processing and scalability for broad WSNs. Clustering often retains the sensors’ minimal energy supplies. The aim of the paper to present the concept of WSN and their Characteristics and discuss the concept of the cluster in a wireless sensor network.

Cloud Computing Security For Algorithms
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
Distributed computing (CC), without unequivocal and direct use oversight, gives the chance of on ... more Distributed computing (CC), without unequivocal and direct use oversight, gives the chance of on request admittance to arrange framework, specifically to information handling and capacity limits. As of late, CC has emerged as a network of public and private server farms giving a typical online interface to customers. Edge registering is a developing model of figuring that takes handling and capacity closer to end-clients to build reaction times and capacity for reinforcement move. Versatile CC (MCC) pushes programming to cell phones by utilizing disseminated figuring. Registering and edge processing, in any case, are confronting security issues, including framework weaknesses and association identification, that quickly postpones figuring models’ acknowledgment. The investigation of PC algo-lithms, which definitely create through training, is AI (ML). We assess security dangers, difficulties and arrangements that utilization at least one ML calculations in this examination report. In this report we have We study various AI calculations, including regulated, unattended, semi-administered, and improved learning, used to tackle cloud security issues. At that point we look at every innovation ’s proficiency dependent on its properties, advantages and burdens. Besides, we have potential testing suggestions to stable CC models.

Design of Health Care Monitoring System Based on Internet of Thing (IOT)
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
The Internet has made this place a worldwide city and web of things (IoT) by allowing the range o... more The Internet has made this place a worldwide city and web of things (IoT) by allowing the range of captors and keen items to collect and process data for various use. In weakening the physical structures of the digital shrewd (IoT) shrewd items become a definitive building. The IoT has a variety of applications, including social security. Different restore and post-operative information should be screened. The human services correspondence using the Web of Things (IoT) technique is adjusted to achieve the therapeutic parameters in the nearby and remote zones. In this paper, we use the remote health care system using advanced information technology and new communications developments and remote physiological measuring technology. The remote benefit services framework provides for the 'free welfare authorities' and 'remote long-term human services administrations' through an entire 'remote social insurance data stage' work instrument by way of coordinated terminal programming and improved social insurance modules. This would encourage the real-time activities of elderly citizens and monitor the healthcare system. The information gathered from various sensors is stored on a local server that connects people, physicians and practitioners to the right information at the time of an emergency. In this way, the framework could increase availability, productivity and reduce well-being costs in order to increase peace of mind and safety. I hope the design and implementation of this system will improve elderly health monitoring in future.

An Overview of OFDM-UWB 60 GHZ System in High Order Modulation Schemes
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
Advanced technology was needed for this within the cap of bandwidth, due to new developments in w... more Advanced technology was needed for this within the cap of bandwidth, due to new developments in wireless networking and the increasing requirement of high data levels by consumers. One of the promising solutions is a system with 60 GHz Ultra-Wideband (UWB) that supports a data rate of up to 7 Gbps, considered 10 times faster than the Wi-Fi 802.11n data rate. The system uses advanced modulation modulations and coding systems called adaptive modulation and coding (AMC). However, inappropriate modulation level selection and coding rate can lead, in the event of radio frequency interference and a multi-way decline, to a low data rate. In fact, if non-optimum decoder due to the code’s restriction duration was chosen, more output loss occurs. In this paper, we will present explain about the OFDM technology. Also, we will discuss 60 GHZ Frequency Band and all their advantage. So, we will explain the OFDM-UWB systems and convolutional coding and viterbi decoding.

Image Super-Resolution Using Sparse Representation And Novelty Noise Removal Super-Resolution
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
The reconstruction of a composite image with a super-resolution will produce a high-resolution im... more The reconstruction of a composite image with a super-resolution will produce a high-resolution image from a low-resolution picture. Since the super-resolution problem is not well answered, a narrow method of optimizing numeric algorithm is implemented to remove image noise. The total variation of the image is minimized subject to noise statistical constraints. The restrictions are imposed on the use of Lagrange multipliers. The solution is derived from the gradient projection method. It is the solution of a partial differential equation based on time based on several constraints described. As t—-$\sim$0o, the solution converges into a continuous image. It is a fast, relatively easy numerical algorithm. The measurements are typically state of the art with very noisy videos. The process is non-invasive, which gives straight boundaries to the picture. A first step to the transfer can be translated. level range of the normal image at a pace equivalent to the level curvature separate from the magnitude of the feature gradient, and a second stage for the return to the boundary point of the picture.
Internet Of Things And Cloud Computing - A Review
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
Digital networking has been a popular platform for Modern Socio-Physical Networks (CPSS) and the ... more Digital networking has been a popular platform for Modern Socio-Physical Networks (CPSS) and the Internet of Things (IoT). However, the issue of how to maintain data transfer and storage protection at CPSS is a big concern that needs to be tackled. During the CPSS transport and storage process we must protect the security and privacy of user data and user identity. To deter users of IoT devices from leaking personal information during data analysis and the transition process, we present a thorough overview of the subject Computational Diffie-Hellman (CDH).
Uploads
Papers by Alaa Hamid Mohammed