Match!
Muayad Sadik Croock
University of Technology, Iraq
Data miningWireless sensor networkComputer networkComputer scienceKey distribution in wireless sensor networks
17Publications
1H-index
3Citations
What is this?
Publications 30
Newest
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any s...
Source
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault ...
Source
At the late years, researches focused on the cyber Denial of Service (DoS) attacks in the Vehicle Ad hoc Networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I) and Vehicle to Road Side Unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is pres...
Source
Newly, the cyber security of Vehicle Ad hoc Network (VANET) includes two practicable: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), that have been considered due to importance. It has become possible to keep pace with the development in the world. The people safety is a priority in the development of technology in general and particular in of VANET for police vehicles. In this paper, we propose a software engineering based self-checking process to ensure the high redundancy of th...
Source
Recently, the wireless sensor network (WSN) has been considered in different application, particularly in emergency systems. Therefore, it is important to keep these networks in high reliability using software engineering techniques in the field of fault tolerance. This paper proposed a fault node detection method in WSN using the self-checking technique according to the rules of software engineering. Then, the detected faulted node is covered employing the reading of nearest neighbor nodes (sen...
Source
The traditional K-Nearest Neighbor (KNN) algorithm uses an exhaustive search for a complete training set to predict a single test sample. This procedure can slow down the system to consume more time for huge datasets. The selection of classes for a new sample depends on a simple majority voting system that does not reflect the various significance of different samples (i.e. ignoring the similarities among samples). It also leads to a misclassification problem due to the occurrence of a double ma...
Source
Recently, the cyber security of vehicular ad-hoc network (VANET) including two practicable: car-to-car and car-to-infrastructure has been considered due to importance. It has become possible to keep pace with the development in the world, where the safety of people is a priority in the development of technology in general and in particular in the field of VANET. In this paper, a cyber security system for VANET has been proposed to tackle the DOS attacks. The proposed system includes three securi...
Source
During the last few years, the allocation of objects or persons inside a specific building is highly required. It is well known that the Global Positioning System (GPS) cannot be adopted in indoor environment due to the lack of signals. Therefore, it is important to discover a new way that works inside. The proposed system uses the deep learning techniques to classify places based on capturing images. The proposed system contains two parts: software part and hardware part. The software part is b...
Source
#1Muayad Sadik Croock (University of Technology, Iraq)H-Index: 1
#2Saja Dhyaa Khuder (University of Technology, Iraq)
Last. Sahar Salamn Mahmood (University of Technology, Iraq)
view all 4 authors...
The breast cancer has affected a wide region of women as a particular case. Therefore, different researchers have focused on the early detection of this disease to overcome it in efficient way. In this paper, an early breast cancer detection system has been proposed based on mammography images. The proposed system adopts deep-learning technique to increase the accuracy of detection. The convolutional neural network (CNN) model is considered for preparing the datasets of training and test. It is ...
Source
It is well known that the development in the life style requires a robust enhancement in the provided services based on technologies. This paper suggests a mobile application under android environment that manages the information and sale systems regarding plants shop. The proposed application uses the Quick Response (QR) codes as identification of an object (plant). The proposed system includes two parts: server and client. The server side contains the most software application, such as databas...
Source
123