Early diagnosis of brain tumour mri images using hybrid techniques between deep and machine learning
…, AS Aljaloud, BA Mohammed… - … Methods in Medicine, 2022 - Wiley Online Library
Cancer is considered one of the most aggressive and destructive diseases that shortens the
average lives of patients. Misdiagnosed brain tumours lead to false medical intervention, …
average lives of patients. Misdiagnosed brain tumours lead to false medical intervention, …
From garbage to biomaterials: an overview on egg shell based hydroxyapatite
I Abdulrahman, HI Tijani, BA Mohammed… - Journal of …, 2014 - Wiley Online Library
The conversion of waste obtained from agricultural processes into biocompatible materials (biomaterials)
used in medical surgery is a strategy that will add more value in waste …
used in medical surgery is a strategy that will add more value in waste …
Multi-method analysis of medical records and MRI images for early diagnosis of dementia and Alzheimer's disease based on deep learning and hybrid methods
Dementia and Alzheimer’s disease are caused by neurodegeneration and poor communication
between neurons in the brain. So far, no effective medications have been discovered for …
between neurons in the brain. So far, no effective medications have been discovered for …
FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks
BA Mohammed, MA Al-Shareeda, S Manickam… - IEEE …, 2023 - ieeexplore.ieee.org
The fifth-generation (5G) technology-enabled vehicular network has been widely used in
intelligent transportation in recent years. Since messages shared among vehicles are always …
intelligent transportation in recent years. Since messages shared among vehicles are always …
[HTML][HTML] Nanocomposites based on Resole/graphene/carbon fibers: a review study
…, ZH Mahmoud, S Abdullaev, BA Mohammed… - Case Studies in …, 2023 - Elsevier
Phenolic resins have excellent dimensional, thermal, chemical and corrosion resistance.
Also, the volatile substances produced during the thermal degradation of this resin have low …
Also, the volatile substances produced during the thermal degradation of this resin have low …
[PDF][PDF] Effect of pollution and cleaning on photovoltaic performance based on experimental study
MT Chaichan, BA Mohammed… - International Journal of …, 2015 - uotechnology.edu.iq
A practical investigation carried out at outdoor conditions in Baghdad-Iraq winter months to
evaluate the effect of traffic air pollution resulted from highways on the PV cells performance. …
evaluate the effect of traffic air pollution resulted from highways on the PV cells performance. …
Chebyshev polynomial-based scheme for resisting side-channel attacks in 5g-enabled vehicular networks
MA Al-Shareeda, S Manickam, BA Mohammed… - Applied Sciences, 2022 - mdpi.com
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks
are often required to cope with schemes based on either bilinear pair cryptography (BPC) or …
are often required to cope with schemes based on either bilinear pair cryptography (BPC) or …
Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks
…, MA Al-Shareeda, S Manickam, BA Mohammed… - Electronics, 2023 - mdpi.com
The privacy and security of the information exchanged between automobiles in 5G-enabled
vehicular networks is at risk. Several academics have offered a solution to these problems in …
vehicular networks is at risk. Several academics have offered a solution to these problems in …
Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks
MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2022 - mdpi.com
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …
Efficient authentication scheme for 5G-enabled vehicular networks using fog computing
…, MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2023 - mdpi.com
Several researchers have proposed secure authentication techniques for addressing privacy
and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify …
and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify …