Hassan Muwafaq Gheni
Al-Mustaqbal University college

Published : 12 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : Bulletin of Electrical Engineering and Informatics

Integrating security and privacy in mmWave communications Ghadah M. Faisal; Hasanain Abdalridha Abed Alshadoodee; Haider Hadi Abbas; Hassan Muwafaq Gheni; Israa Al-Barazanchi
Bulletin of Electrical Engineering and Informatics Vol 11, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i5.4314

Abstract

The aim of this paper is to integrate security and privacy in mmWave communications. MmWave communication mechanism access three major key components of secure communication (SC) operations. proposed design for mmWave communication facilitates the detection of the primary signal in physical (PHY) layer to find the spectrum throughput for primary user (PU) and secondary user (SU). The throughput of SC for PU with maximum throughput being recorded at 0.7934 while maximum throughput for SU is recorded at 0.7679. So, we will design a mmWave communication mechanism for solving this problem. The probability for sensing where the probability of detection (PD) is predicted at a defined range of 690 km with an estimated accuracy of 83.56% while the probability of false alarm (PFA) is predicted at a defined range of 230 km with an estimated accuracy of 81.39%. This conflicting but interrelated issue is investigated over three stages for the purpose of solving with a cross-layer model with MAC and PHY layers for a secure communication network (SCN) while reducing the collision effect concurrently with a 92.76% for both cross-layers. MATLAB 2019b would be forwarded in use as the increasing demand for augmenting the bandwidth in secure communications has actuated the evolutionary technology.
Detection of the patient with COVID-19 relying on ML technology and FAST algorithms to extract the features Seba Aziz Sahy; Sura Hammed Mahdi; Hassan Muwafaq Gheni; Israa Al-Barazanchi
Bulletin of Electrical Engineering and Informatics Vol 11, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i5.4355

Abstract

COVID-19 is unquestionably one of the most hazardous health issues of our century, and it is a significant cause of mortality for both men and women throughout the globe. Even with the most advanced pharmacological and technical innovations, cancer oncologists, and biologists still have a substantial problem treating COVID-19. For patients with COVID-19, it is critical to offer initial, precise, and effective indicative procedures to increase their survival and minimize morbidity and mortality, which is currently lacking. A COVID-19 detection method has been presented in this paper for the initial identification of COVID-19 hazard factors. Features from accelerated segment test (FAST), a robust feature was used to extract features in this suggested method. The experiments show that it is possible to identify FAST traits efficiently. A consequence was a high success rate (98%) for accuracy performance.
Design module for speech recognition graphical user interface browser to supports the web speech applications Fadya A. Habeeb; Suaad M. Saber; Shaymaa Mohammed Abdulameer; Hassan Muwafaq Gheni; Ahmed Dheyaa Radhi
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.4346

Abstract

The web speech API has made it possible to integrate audio data into web applications and make it a unique experience for all customers and users of modern applications. The website can only be accessed through devices equipped with a which stands for graphical user interface (GUI) and screen. For this to be done, there must be a physical attraction with such devices. This paper presents speech recognition using a web browser (SRWB) which permits browsing or surfing the internet with the use of a standard voice-only and vocal user interface (VUL) development. The SRWB system input from the users in form of vocal commands and covers these voice commands to HTTP requests. The SRWB system will send the voice commands to the web server for processing purposes and when the processing is done, the converted or translated HTTP response is outputted to the end-users in a voice format made audible with the attached loudspeakers. SAPI, developed by Microsoft, allows the use of SRWB in Windows applications. The algorithm is implemented by the system to achieve its goal for web content, classifying, analyzing, and sending important parts of web pages back to the end-user.
Man-in-the-middle and denial of service attacks detection using machine learning algorithms Sura Abdulmunem Mohammed Al-Juboori; Firas Hazzaa; Zinah Sattar Jabbar; Sinan Salih; Hassan Muwafaq Gheni
Bulletin of Electrical Engineering and Informatics Vol 12, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i1.4555

Abstract

Network attacks (i.e., man-in-the-middle (MTM) and denial of service (DoS) attacks) allow several attackers to obtain and steal important data from physical connected devices in any network. This research used several machine learning algorithms to prevent these attacks and protect the devices by obtaining related datasets from the Kaggle website for MTM and DoS attacks. After obtaining the dataset, this research applied preprocessing techniques like fill the missing values, because this dataset contains a lot of null values. Then we used four machine learning algorithms to detect these attacks: random forest (RF), eXtreme gradient boosting (XGBoost), gradient boosting (GB), and decision tree (DT). To assess the performance of the algorithms, there are many classification metrics are used: precision, accuracy, recall, and f1-score. The research achieved the following results in both datasets: i) all algorithms can detect the MTM attack with the same performance, which is greater than 99% in all metrics; and ii) all algorithms can detect the DoS attack with the same performance, which is greater than 97% in all metrics. Results showed that these algorithms can detect MTM and DoS attacks very well, which is prompting us to use their effectiveness in protecting devices from these attacks.
Research on fault adaptive fault tolerant control of distributed wind solar hybrid generator Yitong Niu; Intisar A. M. Al Sayed; Alya'a R. Ali; Israa Al_Barazanchi; Poh Soon JosephNg; Zahraa A. Jaaz; Hassan Muwafaq Gheni
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4242

Abstract

Due to the poor accessibility, poor operating conditions, high failure rate, long maintenance time, and difficult maintenance of wind hybrid generators, the economic loss is huge once the failure stops. To this end, the fault adaptive fault-tolerant control of distributed wind and wind hybrid generators is studied, the historical operation data of offshore wind and wind hybrid generators and onshore wind and wind hybrid generators are counted and compared, and the fault characteristics of key components of offshore wind and wind hybrid generators are analyzed. The generator sets are summarized, and the common electrical faults of wind turbines and their impacts on the system are analyzed. This paper summarizes the current research status of fault-tolerant operation of existing offshore wind and wind complementary generators in terms of software fault tolerance and hardware fault tolerance, summarizes the current fault tolerance schemes for offshore wind and wind complementary generators, and analyzes the application feasibility of existing fault tolerance schemes. In addition, the main problems of fault-tolerant offshore wind and solar complementary generator sets are pointed out, and future research hotspots are foreseen.
The role of artificial intelligence in enhancing administrative decision support systems by depend on knowledge management Hasanain Abdalridha Abed Alshadoodee; Muneer Sameer Gheni Mansoor; Hasanien Kariem Kuba; Hassan Muwafaq Gheni
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.4243

Abstract

This study illustrates the role of artificial intelligence in enhancing administrative decision support systems by depend on knowledge management. As per new technologies are evolving and the workflow need more concious approach of implementation, thus the role of artificial intelligence is evolved in support to decision making. The study takes privates college administration as a varible on which the results rely. The upgrades in innovation have upgraded most techniques for leading business tasks that further develop organizations and administration conveyance. Companies in this area need to wander into digitizing of all industry cycles, business sequences linked to administration and more essential services in educational institutes over time. The need for a proper decision-making support using knowledge management stills create a big gap in the foundation of an effective and efficient eductaional system for the good governance and to improve the image of some institute. The examination interaction has been intended to follow an iterative methodology of information revelation chose for the review. Using the statistical package for social sciences (IBM-SPSS) version 23 logic instrument, the illustrative research was completed with insights into the segment profile of the respondents. Hayes' process macro v3.3 with SPSS was used to analyze the interceding effect.
A missing data imputation method based on salp swarm algorithm for diabetes disease Geehan Sabah Hassan; Noora Jamal Ali; Asma Khazaal Abdulsahib; Farah Jasim Mohammed; Hassan Muwafaq Gheni
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.4528

Abstract

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve Bayesian classifier (NBC) have been enhanced as compared to the dataset before applying the proposed method. Moreover, the results indicated that issa was performed better than the statistical imputation techniques such as deleting the samples with missing values, replacing the missing values with zeros, mean, or random values.