• Home
  • Mohammed Ali Tawfeeq
Mohammed Ali Tawfeeq

Mohammed Ali Tawfeeq
Mustansiriyah University · College of Engineering / Computer Eng. Dept.

Professor

About

32
Publications
4,409
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
44
Citations
Citations since 2017
22 Research Items
43 Citations
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
Additional affiliations
September 2010 - present
College of Engineering-University of Mustnsiriyah
Position
  • Academic staff member
Description
  • Artificial Neural Networks, Fuzzy logic, Genetic Algorithms
Education
October 2002 - December 2006
University of Technology, Iraq
Field of study
  • Computer Engineering
December 1986 - February 1989
University of Baghdad
Field of study
  • Computer Engineering
September 1975 - June 1979
University of Technology
Field of study
  • Electrical Engineering

Publications

Publications (32)
Article
Objective: This study aimed to design an artificial neural network for the prediction of cephalometric variables via a lateral photo- graph in skeletal Class I, II, and III patterns. Methods: A total of 94 patients were recruited for this prospective study, with an age range of 15-20 years (41 boys and 53 girls) seek- ing orthodontic treatment. Ac...
Article
The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing time. This paper presents a two-stage algorithm to select a route that can sustain communication between vehicle...
Chapter
The proliferation and diversity of Internet of things (IoT) devices increase IoT system risks. This open many challenging area for research like identifying authorized and unauthorized IoT devices, classifying events of devices, detecting network traffic anomalies generated by such devices, etc. To do so, machine and deep learning algorithms should...
Article
Full-text available
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges for network traffic analysis, and processing packet flows to identify IoT devices. This type of device suffers from scarcity, making them vulnerable to spoofing operations. In such circumstances, the device can be recognized by identifying its fingerp...
Article
The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing time. This paper presents a two-stage algorithm to select a route that can sustain communication between vehicle...
Conference Paper
Full-text available
The pervasive availability of the Internet of Things (IoT) markets lures targets for cyber-attacks since most manufactured IoT devices are usually resource-constrained devices. The first powerful line of IoT network protection from these vulnerabilities is detecting IoT devices especially the unauthorized ones by utilizing machine learning (ML) alg...
Article
Full-text available
Peak load periods have a great impact for energy demand in smart grid. These times is directly related to the consumption of residential sector, thus utility need to add additional generation capacity during peak time to support the demand required. This paper proposes a demand response system for residential household. Analytical Method (AM) is us...
Article
Full-text available
The dramatic growth of Internet of Things (IoT) devices in recent years increases the IoT networks’ vulnerabilities and introduces new challenges among machine learning (ML) algorithms to detect the networked devices. The creation of a Device Fingerprint (DFP) may depend on extracting the network traffic features related to the device except for t...
Conference Paper
Full-text available
The dramatic growth of Internet of Things (IoT) devices in recent years increases the IoT networks’ vulnerabilities and introduces new challenges among machine learning (ML) algorithms to detect the networked devices. The creation of a Device Fingerprint (DFP) may depend on extracting the network traffic features related to the device except for th...
Article
Objective: The purpose of this study was to establish Neural Network for prediction the size of unerupted premolars and canines in Iraqi population. Design: Prospective cohort study Subjects and Methods: for this study, ninety four adult patients (41 males and 53 females) seeking for orthodontic treatment with the age range of 15-20 years were recr...
Article
The rapid development in communications and sensors technologies make wireless sensor networks (WSNs) as essential key in several advanced applications such as internet of things (IoT). The increasing demands on using WSNs required high quality of services (QoS) because most WSNs applications have critical requirements. This work aims to offer a ro...
Article
Full-text available
The rapid expansion in the use of IoT imposes the importance of developing its infrastructure. One of the most important components in IoT infrastructures is the wireless sensor networks. The development of these networks largely depends on how to extend their life. As one of the effective options adopted in this field is the use of cluster heads (...
Article
Full-text available
Peak load periods in smart grids significantly affect the energy stability produced by energy suppliers. One of the important factors that distinctly affects the load during these periods is the household energy consumption. Thus, managing and improving energy demand for smart home appliances can effectively reduce the peak loads which represents a...
Article
The rapid development in communications and sensors technologies make Wireless Sensor Networks (WSNs) as essential key in several advanced applications such as Internet of Things (IoT). The increasing demands on using WSNs required high Quality of Services (QoS) because most WSNs applications have critical requirements. This work aims to offer a ro...
Preprint
Full-text available
Despite the availability of radiology devices in some health care centers, thorax diseases are considered as one of the most common health problems, especially in rural areas. In this paper, pre-trained AlexNet and ResNet-50 models are used and compared for diagnosing thorax diseases. Chest x-ray images has been used to diagnose thorax diseases and...
Article
Full-text available
In recent years, radiography systems have become more used in medical fields, where they are used for diagnosing many diseases. The size of the radiographs differs, as well as the size of the body parts for each patient. So many researchers crop the radiographs manually to facilitate the diagnosis and make it more reliable. Currently, the trend tow...
Article
Full-text available
The motivation behind this paper is to explore an algorithm that has the ability to optimize the free parameters required to design a neural network without being diligent in determining its values. The method uses modified version of Multi-Sonar Bat Units (MSBU) algorithm which is based on the idea that bats leave their roost shelter in groups and...
Article
Full-text available
The development of Wireless Sensor Networks (WSNs) has been attained in the past few years due to its important using in wide range of application. The readings of data derived from WSN nodes are not always accurate and may contain abnormal data. This paper proposed an anomaly detection and classification algorithm in WSNs. At first, an integration...
Article
Full-text available
Received Apr 25, 2019 Revised Jul 7, 2019 Accepted Jul 18, 2019 Despite the availability of radiology devices in some health care centers, thorax diseases are considered as one of the most common health problems, especially in rural areas. By exploiting the power of the Internet of things and specific platforms to analyze a large volume of medica...
Conference Paper
Full-text available
In recent years, radiography systems have become more used in medical fields, where they are used for diagnosing many diseases. The size of the radiographs differs, as well as the size of the body parts for each patient. So many researchers crop the radiographs manually to facilitate the diagnosis and make it more reliable. Currently, the trend tow...
Article
Full-text available
The rapid development of Smart Cities and the Internet of Thinks (IoT) is largely dependent on data obtained through Wireless Sensor Networks (WSNs). The quality of data gathered from sensor nodes is influenced by abnormalities that happen due to different reasons including, malicious attacks, sensor malfunction or noise related to communication ch...
Article
Full-text available
The evolution of wireless communication technology increases human machine interaction capabilities especially in controlling robotic systems. This paper introduces an effective wireless system in controlling the directions of a wheeled robot based on online hand gestures. The hand gesture images are captured and processed to be recognized and clas...
Research
An accurate precipitation forecast can reflect positive impact in several areas. It provides helpful data in hydrological projects designs, such as constructing dams, reservoirs, rainfall networks, as well as takes some precautionary measures that can overcome the flooding problems. This paper proposes a monthly quantitative precipitation forecasti...
Research
Most of the hearing aid wearers suffer from hearing clear speech in the presence of background noise. Background noise can be repetitive low frequencies, or can be random high frequency. This paper introduces advanced technique for noise cancellation from hearing aids to insure most comfortable hearing. The objective of the proposed technique is to...
Research
This paper introduces a proposed method based on a backpropagation artificial neural network using Scaled Conjugate Gradient (SCG) training algorithm so as to gain the edges of any image. A new training image model is suggested to train this artificial neural network, then using this network to find the edges of any image. Computer experiments are...
Research
Internet security zones are an Internet Explorer (IE) features that allow users to access websites based on their level of trust. Internet explorer assigns all websites to one of four security zones, in which, each zone has some settings that specifies its standard security level. IE categorizes the security to five levels represented by linguistic...
Article
Full-text available
This paper presents a new intelligent algorithm that can solve the problems of finding the optimum solution in the state space among which the desired solution resides. The algorithm mimics the principles of bat sonar in finding its targets. The algorithm introduces three search approaches. The first search approach considers a single sonar unit (S...
Research
In this work, a new key exchange protocol for IP-based mobile networks is introduced. This protocol is called KEPSOM (Key Exchange Protocol Supporting Mobility and Multihoming). The goals of designing KEPSOM are to develop key exchange protocol proposal characterized by its secrecy, simplicity, efficiency, resistivity, and its ability to support mo...
Research
Design and implementation of dual characters faces technique in information using computer printed text Authors Dr. Abdul Monem S. Rahma, Mohammed Ali Tawfeeq
Research
This work is concerned with the use of the Fourier descriptor technique for reproducing the hysteresis loop for both sinusoidal and distorted flux-density waveforms that produce minor hysteresis loops. The hysteresis curve is characterized only at discrete points. Approximating the curve by a polygon with a limited number of sides, the Fourier seri...
Conference Paper
Equivalent Circuit of Static Electromagnetic Devices Using Curve Fitting Techniques

Questions

Questions (2)
Question
Cognitive IoT can be defined as the combination of Artificial computing technologies with the sensed IoT data to take the appropriate actions that the IoT devices can perform. Are there any suggestion to proposed a suitable measurements to evaluate the performance of such application?
Question
Different deep learning networks can be used in classifications. What about prediction problem? which deep learning network can be used? and what is its architecture?

Network

Cited By