Dilovan Zebari

Dilovan Zebari
Universiti Teknologi Malaysia | UTM · Department of Information security

Doctor of Philosophy in Computer Science

About

44
Publications
14,122
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
963
Citations
Citations since 2017
43 Research Items
955 Citations
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400

Publications

Publications (44)
Article
Full-text available
Susceptibility analysis is an intelligent technique that not only assists decision makers in assessing the suspected severity of any sort of brain tumour in a patient but also helps them diagnose and cure these tumours. This technique has been proven more useful in those developing countries where the available health-based and funding-based resour...
Article
Full-text available
The emerging novel variants and re-merging old variants of SARS-CoV-2 make it critical to study the transmission probability in mixed-mode ventilated office environments. Artificial neural network (ANN) and curve fitting (CF) models were created to forecast the R-Event. The R-Event is defined as the anticipated number of new infections that develop...
Article
Full-text available
Omicron, so-called COVID-2, is an emerging variant of COVID-19 which is proved to be the most fatal amongst the other variants such as alpha, beta and gamma variants (a, b, g variants) due to its stern and perilous nature. It has caused hazardous effects globally in a very short span of time. The diagnosis and medication of Omicron patients are bot...
Article
Full-text available
: Person re-identification has become an essential application within computer vision due to its ability to match the same person over non-overlapping cameras. However, it is a challenging task because of the broad view of cameras with a large number of pedestrians appearing with various poses. As a result, various approaches of supervised model le...
Article
Full-text available
Electroluminescence (EL) imaging is a technique for acquiring images of photovoltaic (PV) modules and examining them for surface defects. Analysis of EL images has been manually performed by visual inspection of images by experts. This manual procedure is tedious, time-consuming, subjective, and requires deep expert knowledge. In this work, a hybri...
Article
Full-text available
Coronavirus disease 2019 (COVID‐19) has attracted significant attention of researchers from various disciplines since the end of 2019. Although the global epidemic situation is stabilizing due to vaccination, new COVID‐19 cases are constantly being discovered around the world. As a result, lung computed tomography (CT) examination, an aggregated id...
Article
Full-text available
Nowadays, VANET (Vehicular Ad hoc Network) is one of the key aspects of developing advanced intelligent transportation systems. Due to its huge mobility and rapid topology alteration, the network exposes to link failure that affects the firmness of the network and causes delay and congestion. Additionally, the dynamic change in the network routing...
Article
Full-text available
Breast cancer detection using mammogram images at an early stage is an important step in disease diagnostics. We propose a new method for the classification of benign or malignant breast cancer from mammogram images. Hybrid thresholding and the machine learning method are used to derive the region of interest (ROI). The derived ROI is then separate...
Article
Full-text available
Breast cancer is one of the most prevalent types of cancer that plagues females. Mortality from breast cancer could be reduced by diagnosing and identifying it at an early stage. To detect breast cancer, various imaging modalities can be used, such as mammography. Computer-Aided Detection/Diagnosis (CAD) systems can assist an expert radiologist to...
Article
Full-text available
In the last decade, the Facial Expression Recognition field has been studied widely and become the base for many researchers, and still challenging in computer vision. Machine learning technique used in facial expression recognition facing many problems, since human emotions expressed differently from one to another. Nevertheless, Deep learning tha...
Article
Full-text available
The importance of the plant for the human being and the environment led to deeply been studied and classified in detail. The advancement of the technology is the main factor in finding many ways for plant identification process. Some kind of initial intelligence systems in order to identify plant, followed by many theories and concepts using method...
Article
Full-text available
Diabetes may be predicted and prevented by exploring critical diabetes characteristics by computational data extraction methods. This study proposed a system biology approach to the pathogenic process to identify essential biomarkers as drug targets. The fact that disease recognition and investigation require many details, data mining plays a criti...
Article
Full-text available
Classification is the most widely applied machine learning problem today, with implementations in face recognition, flower classification, clustering, and other fields. The goal of this paper is to organize and identify a set of data objects. The study employs K-nearest neighbors, decision tree (j48), and random forest algorithms, and then compares...
Article
Full-text available
Rapid changes are occurring in our global ecosystem, and stresses on human well-being, such as climate regulation and food production, are increasing, soil is a critical component of agriculture. The project aims to use Data Mining (DM) classification techniques to predict soil data. Analysis DM classification strategies such as k-Nearest-Neighbors...
Article
Full-text available
This paper proposes a watermarking method for grayscale images, in which lifting wavelet transform and singular value decomposition are exploited based on multi-objective artificial bee colony optimization to produce a robust watermarking method. Furthermore, for increasing security encryption of the watermark is done prior to the embedding operati...
Article
Full-text available
p> Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new a...
Article
Full-text available
Collective improvement in the acceptable or desirable accuracy level of breast cancer image-related pattern recognition using various schemes remains challenging. Despite the combination of multiple schemes to achieve superior ultrasound image pattern recognition by reducing the speckle noise, an enhanced technique is not achieved. The purpose of t...
Article
Full-text available
Segmentation of the breast region and pectoral muscle are fundamental subsequent steps in the process of Computer-Aided Diagnosis (CAD) systems. Segmenting the breast region and pectoral muscle are considered a difficult task, particularly in mammogram images because of artefacts, homogeneity among the region of the breast and pectoral muscle, and...
Article
Full-text available
Information security and confidentiality are the prime concern of any type of communication. The techniques that utilizing inconspicuous digital media such as text, audio, video and image for hiding confidential data in it are collectively called Steganography. The key challenge of steganographic system design is to maintain a fair trade-off betwee...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover im...
Article
Full-text available
Due to sharp increases in data dimensions, working on every data mining or machine learning (ML) task requires more efficient techniques to get the desired results. Therefore, in recent years, researchers have proposed and developed many methods and techniques to reduce the high dimensions of data and to attain the required accuracy. To ameliorate...
Article
Wavelet transform (WT) for image processing is one of the most popular methods in the frequency domain, the information of images could be represented as a group based on this method. The aim of this paper is to provide a wide-ranging review of the survey found able on wavelet-based image processing applications approaches. This paper reviews the n...
Conference Paper
Breast cancer (BC) is a main killer disease for women and men. It can be cured and controlled only if it is detected at its early detection. BC initial identification can be realized by the help of computer support identification approaches. From the detailed study on previous researches, it is found that, there is no system producing high accuracy...
Conference Paper
Full-text available
In developing countries breast cancer has been found to be one of the diseases that threatens the lives of women, and that is why finding ways of detecting efficiently is of great importance. The detection of breast cancer at an early stage through self-examination is very difficult. In this study, we proposed a new descriptor that can help to iden...
Conference Paper
One of the main causes of increased mortality among women is breast cancer. The ultrasound scan is the most widely used method for diagnosing geological disease i.e. breast cancer. The first step for identifying the abnormality of the breast cancer (malignant from benign), is the extraction of the region of interest (ROI). In order to achieve this,...
Article
Full-text available
Information security and confidentiality are a key concern, particularly with the rampant growth and use of the internet. Along with the growth comes the incidents of unauthorized information access which are countered by the use of varied secure communication techniques, namely; cryptography and data hiding. More recent trends are concerned with t...
Book
Nowadays, designers of digital logic circuits are looking for getting as maximum accuracy as possible for the designed circuits with possible minimum consumed time, and finally with as minimum effort as possible. Overcoming all of these constraints cannot be achieved by traditional approaches even when using Karnaugh-Maps, especially when using mor...

Network

Cited By

Projects