scispace - formally typeset
Search or ask a question
Author

Husam Jasim Mohammed

Bio: Husam Jasim Mohammed is an academic researcher from Universiti Utara Malaysia. The author has contributed to research in topics: Computer science & Artificial intelligence. The author has an hindex of 12, co-authored 19 publications receiving 543 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposed two-way image transmission to the Corvus Coron module, which presents an energy-effective with the CS model, as an inbuilt interaction in the CS transmission through the security framework, which results in energy-efficient and conserved transmission in the form of low error rate with low computational time.
Abstract: Two-way image communication in a wireless channel needs to be viable with channel properties such as transfer speed, energy-effective, time usage, and security because image capability consumes a huge space in the gadget and is quite effective. Is required in a manner. The figure goes through attacks. In addition, the quiesical issue for additional time of pressure is that the auxiliary interaction of pressure occurs through the dewar receiving extra time. To address these issues, compressed sensing emerges, which packs the image into hours of sensing, is generated in an expedient manner that reduces time usage and saves the use of data transfer capability, however Bomb in transmission. A variety of examinations cleared a way for dealing with security issues in compressive sensing (CS) through giving security as an alternative negotiation. In addition, univariate factors opted for CS as the issue of rearranging image quality is because of the aggregation of clutter. Along these lines related to the above issues, this paper proposed two-way image transmission to the Corvus Coron module, which presents an energy-effective with the CS model, as an inbuilt interaction in the CS transmission through the security framework. Receives what was designated as the pack-protected plot. Impeccable entertainment with the famous arbitrary network conjecture in CS. The result of the test is that the practical module presents energy-efficient and conserved transmission in the form of low error rate with low computational time.

230 citations

Journal ArticleDOI
TL;DR: The aim of the researcher was to determine the effectiveness of artificial intelligence techniques against cyber security risks particularly in case of Iraq and the quantitative method of research design along with primary data was opted.

144 citations

Journal ArticleDOI
TL;DR: There is a need for cybersecurity because it defines the body of processes, technologies, and practices in terms of how they are designed to help protect various programs, devices, networks, and data from the malicious persons who perform unauthorized access and damage these resources.

139 citations

Journal ArticleDOI
TL;DR: In this paper , the authors explore the current research problems using the 5G technology, and propose the novel architecture for smart healthcare systems using 5G and Industry 4.0 standards using the Network Simulator (NS2) to investigate the current 5G methods.
Abstract: The emergence of the Industry 4.0 revolution to upgrade the Internet of Things (IoT) standards provides the prominence outcomes for the future wireless communication systems called 5G. The development of 5G green communication systems suffers from the various challenges to fulfill the requirement of higher user capacity, network speed, minimum cost, and reduced resource consumption. The use of 5G standards for Industry 4.0 applications will increase data rate performance and connected device's reliability. Since the arrival of novel Covid-19 disease, there is a higher demand for smart healthcare systems worldwide. However, designing the 5G communication systems has the research challenges like optimum resource utilization, mobility management, cost-efficiency, interference management, spectral efficiency, etc. The rapid development of Artificial Intelligence (AI) across the different formats brings performance enhancement compared to conventional techniques. Therefore, introducing the AI into 5G standards will optimize the performances further considering the various end-user applications. We first present the survey of the terms like 5G standard, Industry 4.0, and some recent works for future wireless communications. The purpose is to explore the current research problems using the 5G technology. We further propose the novel architecture for smart healthcare systems using the 5G and Industry 4.0 standards. We design and implement that proposed model using the Network Simulator (NS2) to investigate the current 5G methods. The simulation results show that current 5G methods for resource management and interference management suffer from the challenges like performance trade-offs.

58 citations


Cited by
More filters
Posted Content
TL;DR: In this article, the authors uncover institutional voids as the source of market exclusion and identify two sets of activities: redefining market architecture and legitimizing new actors as critical for building "inclusive" markets.
Abstract: Much effort goes into building markets as a tool for economic and social development, often overlooking that in too many places social exclusion and poverty prevent many, especially women, from participating in and accessing markets. Building on data from rural Bangladesh and analyzing the work of a prominent intermediary organization, we uncover institutional voids as the source of market exclusion and identify two sets of activities – redefining market architecture and legitimating new actors – as critical for building ‘inclusive' markets. We expose voids as ‘analytical spaces' and illustrate how they result from conflict and contradiction among institutional ‘bits and pieces' from local political, community, and religious spheres. Our findings put forward a perspective on market building that highlights the ‘on the ground' dynamics and attends to the ‘institutions at play', to their consequences, and to a more diverse set of ‘inhabitants' of institutions.

739 citations

Journal ArticleDOI
TL;DR: In this article, the authors identify the critical success factors for E-learning during COVID-19 using the multi-criteria Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) techniques to enhance the educational process.
Abstract: During the COVID-19 pandemic, educational institutions were shut down all over the world, which impacted over 60% of students and caused a massive disruption of the education system. The goal of this paper was to identify the critical success factors for E-learning during COVID-19 using the multi-criteria Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) techniques to enhance the educational process. Data were generated by interviewing 69 E-learning managers in educational institutions during COVID-19 based on defined evaluation criteria and E-learning approaches through several channels. We found that technology management, support from management, increased student awareness to use E-learning systems, and demanding a high level of information technology from instructors, students, and universities were the most influential factors for E-learning during COVID-19. Among the five learning systems, blended learning was the most suitable learning system to practice. These results demonstrated that, regardless of how extraordinary the technology is in an educational institution, the readiness of E-learning execution played a large role in boosting the educational process during the COVID-19 pandemic.

287 citations

Journal ArticleDOI
TL;DR: The aim of the researcher was to determine the effectiveness of artificial intelligence techniques against cyber security risks particularly in case of Iraq and the quantitative method of research design along with primary data was opted.

144 citations

Journal ArticleDOI
TL;DR: There is a need for cybersecurity because it defines the body of processes, technologies, and practices in terms of how they are designed to help protect various programs, devices, networks, and data from the malicious persons who perform unauthorized access and damage these resources.

139 citations