
Mohammed Ali TawfeeqMustansiriyah University · College of Engineering / Computer Eng. Dept.
Mohammed Ali Tawfeeq
Professor
About
32
Publications
4,409
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
44
Citations
Citations since 2017
Introduction
Additional affiliations
September 2010 - present
College of Engineering-University of Mustnsiriyah
Position
- Academic staff member
Description
- Artificial Neural Networks, Fuzzy logic, Genetic Algorithms
Education
October 2002 - December 2006
December 1986 - February 1989
September 1975 - June 1979
University of Technology
Field of study
- Electrical Engineering
Publications
Publications (32)
Objective: This study aimed to design an artificial neural network for the prediction of cephalometric variables via a lateral photo- graph in skeletal Class I, II, and III patterns.
Methods: A total of 94 patients were recruited for this prospective study, with an age range of 15-20 years (41 boys and 53 girls) seek- ing orthodontic treatment. Ac...
The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing time. This paper presents a two-stage algorithm to select a route that can sustain communication between vehicle...
The proliferation and diversity of Internet of things (IoT) devices increase IoT system risks. This open many challenging area for research like identifying authorized and unauthorized IoT devices, classifying events of devices, detecting network traffic anomalies generated by such devices, etc. To do so, machine and deep learning algorithms should...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges for network traffic analysis, and processing packet flows to identify IoT devices. This type of device suffers from scarcity, making them vulnerable to spoofing operations. In such circumstances, the device can be recognized by identifying its fingerp...
The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing time. This paper presents a two-stage algorithm to select a route that can sustain communication between vehicle...
The pervasive availability of the Internet of Things (IoT) markets lures targets for cyber-attacks since most manufactured IoT devices are usually resource-constrained devices. The first powerful line of IoT network protection from these vulnerabilities is detecting IoT devices especially the unauthorized ones by utilizing machine learning (ML) alg...
Peak load periods have a great impact for energy demand in smart grid. These times is directly related to the consumption of residential sector, thus utility need to add additional generation capacity during peak time to support the demand required. This paper proposes a demand response system for residential household. Analytical Method (AM) is us...
The dramatic growth of Internet of Things (IoT) devices in recent years increases the
IoT networks’ vulnerabilities and introduces new challenges among machine learning (ML) algorithms to detect the networked devices. The creation of a Device Fingerprint (DFP) may depend on extracting the network traffic features related to the device except for t...
The dramatic growth of Internet of Things (IoT) devices in recent years increases the
IoT networks’ vulnerabilities and introduces new challenges among machine learning (ML)
algorithms to detect the networked devices. The creation of a Device Fingerprint (DFP) may depend on extracting the network traffic features related to the device except for th...
Objective: The purpose of this study was to establish Neural Network for prediction the size of unerupted premolars and canines in Iraqi population.
Design: Prospective cohort study
Subjects and Methods: for this study, ninety four adult patients (41 males and 53 females) seeking for orthodontic treatment with the age range of 15-20 years were recr...
The rapid development in communications and sensors technologies make wireless sensor networks (WSNs) as essential key in several advanced applications such as internet of things (IoT). The increasing demands on using WSNs required high quality of services (QoS) because most WSNs applications have critical requirements. This work aims to offer a ro...
The rapid expansion in the use of IoT imposes the importance of developing its infrastructure. One of the most important components in IoT infrastructures is the wireless sensor networks. The development of these networks largely depends on how to extend their life. As one of the effective options adopted in this field is the use of cluster heads (...
Peak load periods in smart grids significantly affect the energy stability produced by energy suppliers. One of the important factors that distinctly affects the load during these periods is the household energy consumption. Thus, managing and improving energy demand for smart home appliances can effectively reduce the peak loads which represents a...
The rapid development in communications and sensors technologies make Wireless Sensor Networks (WSNs) as essential key in several advanced applications such as Internet of Things (IoT). The increasing demands on using WSNs required high Quality of Services (QoS) because most WSNs applications have critical requirements. This work aims to offer a ro...
Despite the availability of radiology devices in some health care centers, thorax diseases are considered as one of the most common health problems, especially in rural areas. In this paper, pre-trained AlexNet and ResNet-50 models are used and compared for diagnosing thorax diseases. Chest x-ray images has been used to diagnose thorax diseases and...
In recent years, radiography systems have become more used in medical fields, where they are used for diagnosing many diseases. The size of the radiographs differs, as well as the size of the body parts for each patient. So many researchers crop the radiographs manually to facilitate the diagnosis and make it more reliable. Currently, the trend tow...
The motivation behind this paper is to explore an algorithm that has the ability to optimize the free parameters required to design a neural network without being diligent in determining its values. The method uses modified version of Multi-Sonar Bat Units (MSBU) algorithm which is based on the idea that bats leave their roost shelter in groups and...
The development of Wireless Sensor Networks (WSNs) has been attained in the past few years
due to its important using in wide range of application. The readings of data derived from WSN nodes are
not always accurate and may contain abnormal data. This paper proposed an anomaly detection and
classification algorithm in WSNs. At first, an integration...
Received Apr 25, 2019 Revised Jul 7, 2019 Accepted Jul 18, 2019
Despite the availability of radiology devices in some health care centers, thorax diseases are considered as one of the most common health problems, especially in rural areas. By exploiting the power of the Internet of things and specific platforms to analyze a large volume of medica...
In recent years, radiography systems have become more used in medical fields, where they are used for diagnosing many diseases. The size of the radiographs differs, as well as the size of the body parts for each patient. So many researchers crop the radiographs manually to facilitate the diagnosis and make it more reliable. Currently, the trend tow...
The rapid development of Smart Cities and the Internet of Thinks (IoT) is largely dependent on data obtained through Wireless Sensor Networks (WSNs). The quality of data gathered from sensor nodes is influenced by abnormalities that happen due to different reasons including, malicious attacks, sensor malfunction or noise related to communication ch...
The evolution of wireless communication technology increases human machine interaction capabilities especially in controlling robotic systems. This paper introduces an effective wireless system in controlling the directions of a wheeled robot based on online hand gestures. The hand gesture images are captured and processed to be recognized and clas...
An accurate precipitation forecast can reflect positive impact in several areas. It provides helpful data in hydrological projects designs, such as constructing dams, reservoirs, rainfall networks, as well as takes some precautionary measures that can overcome the flooding problems. This paper proposes a monthly quantitative precipitation forecasti...
Most of the hearing aid wearers suffer from hearing clear speech in the presence of background noise. Background noise can be repetitive low frequencies, or can be random high frequency. This paper introduces advanced technique for noise cancellation from hearing aids to insure most comfortable hearing. The objective of the proposed technique is to...
This paper introduces a proposed method based on a backpropagation artificial neural network using Scaled Conjugate Gradient (SCG) training algorithm so as to gain the edges of any image. A new training image model is suggested to train this artificial neural network, then using this network to find the edges of any image. Computer experiments are...
Internet security zones are an Internet Explorer (IE) features that allow users to access websites based on their level of trust. Internet explorer assigns all websites to one of four security zones, in which, each zone has some settings that specifies its standard security level. IE categorizes the security to five levels represented by linguistic...
This paper presents a new intelligent algorithm that can solve the problems
of finding the optimum solution in the state space among which the desired
solution resides. The algorithm mimics the principles of bat sonar in finding
its targets. The algorithm introduces three search approaches. The first search
approach considers a single sonar unit (S...
In this work, a new key exchange protocol for IP-based mobile networks is
introduced. This protocol is called KEPSOM (Key Exchange Protocol Supporting Mobility and Multihoming). The goals of designing KEPSOM are to develop key exchange protocol proposal characterized by its secrecy, simplicity, efficiency, resistivity, and its ability to
support mo...
Design and implementation of dual characters faces technique in information using computer printed text
Authors
Dr. Abdul Monem S. Rahma, Mohammed Ali Tawfeeq
This work is concerned with the use of the Fourier descriptor technique for reproducing the hysteresis loop for both sinusoidal and distorted flux-density waveforms that produce minor hysteresis loops. The hysteresis curve is characterized only at discrete points. Approximating the curve by a polygon with a limited number of sides, the Fourier seri...
Equivalent Circuit of Static Electromagnetic Devices Using Curve Fitting Techniques
Questions
Questions (2)
Cognitive IoT can be defined as the combination of Artificial computing technologies with the sensed IoT data to take the appropriate actions that the IoT devices can perform. Are there any suggestion to proposed a suitable measurements to evaluate the performance of such application?
Different deep learning networks can be used in classifications. What about prediction problem? which deep learning network can be used? and what is its architecture?