• Home
  • Osamah Ibrahem Khalaf
Osamah Ibrahem Khalaf

Osamah Ibrahem Khalaf
Al-Nahrain University

Doctor of Philosophy

About

119
Publications
39,282
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,530
Citations

Publications

Publications (119)
Article
Full-text available
When it comes to conveying sentiments and thoughts, facial expressions are quite e ective. For human-computer collaboration, data-driven animation, and communication between humans and robots to be successful, the capacity to recognize emotional states in facial expressions must be developed and implemented. Recently published studies have found th...
Article
Full-text available
Wireless Underground Sensor Networks (WUSNs) have been showing prospective supervising application domains in the underground region of the earth through sensing, computation, and communication. This paper presents a novel Deep Learning (DL)-based Cooperative communication channel model for Wireless Underground Sensor Networks for accurate and reli...
Article
Full-text available
In the field of intelligent transportation systems (ITS), video surveillance is a hot research topic; this surveillance is used in a variety of applications, such as detecting the cause of an accident, tracking down a specific vehicle, and discovering routes between major locations. Object detection and shadow elimination are the main tasks in this...
Article
Full-text available
Global warming is one of the most compelling environmental threats today, as the rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts of energy that the thermal power plants mainly generate. Primarily fossil fuels like coal and oil...
Article
Full-text available
Technology evaluation in the electronics field leads to the great development of Wireless Sensor Networks (WSN) for a variety of applications. The sensor nodes are deployed in hazardous environments, and they are operated by isolated battery sources. Network connectivity is purely based on power availability, which impacts the network lifetime. Hen...
Article
Full-text available
Groundwater is one of the fundamental sources for the people in Chennai Region; also, determination of groundwater depth will be utilized for prior planning on excavation and construction purposes. This research article determines the depth of groundwater table by adopting various soft computing techniques like support vector machine (SVM), adaptiv...
Article
Full-text available
Magnetic Resonance Imaging to detect its lesions is used to diagnose multiple sclerosis. Experts usually perform this detection process manually, but there is interest in automating it to speed up the diagnosis and monitoring of this disease. A variety of automatic image segmentation methods have been proposed to quickly detect these lesions. A Gau...
Article
Full-text available
Within numerous IoT domains, recent IoT proliferation has influenced organizational activities and business procedures. The number of connected edge devices has increased dramatically, resulting in a vast stream of data that is prone to leakage and manipulation, decreasing the security level of the attacked IoT ecosystem. Anomaly detection systems...
Article
Lump in the breast, discharge of blood from the nipple, and deformation of the nipple/breast and its texture are the symptoms of breast cancer. Though breast cancer is very common in women, men can also get breast cancer. In the early stages, BCD makes use of Thermal Mammograms Breast Images (TMBI). The cost of treatment can be severely reduced in...
Article
Full-text available
Underwater wireless sensor networks (UWSNs) have applications in several fields, such as disaster management, underwater navigation, and environment monitoring. Since the nodes in UWSNs are restricted to inbuilt batteries, the effective utilization of available energy becomes essential. Clustering and routing approaches can be employed as energy-ef...
Article
Full-text available
This paper proposes a symmetric eight transistor-three-memristor (8T3R) non-volatile static random-access memory (NVSRAM) cell. Non-volatile operation is achieved through the use of a memristor element, which stores data in the form of its resistive state and is referred to as RRAM. This cell is able to store the information after power-off mode an...
Article
Full-text available
Diabetes is considered to be one of the leading causes of death globally. If diabetes is not treated and detected early, it can lead to a variety of complications. The aim of this study was to develop a model that can accurately predict the likelihood of developing diabetes in patients with the greatest amount of precision. Classification algorithm...
Article
Full-text available
Alzheimer's disease (AD) is the leading cause of dementia in older adults. There is currently a lot of interest in applying machine learning to find out metabolic diseases like Alzheimer's and Diabetes that affect a large population of people around the world. Their incidence rates are increasing at an alarming rate every year. In Alzheimer's disea...
Chapter
The multiplier is a primary function of the circuit that is frequently used in Digital Signal Processing. Estimated circuits were investigated for better efficiency/lower power consumption but are still troubled by errors. A modern DSP unit has an innovative approximate multiplier and a simple critical path. It uses a modern logic design less uniqu...
Article
With the advancement of edge computing, the computing power that was originally located in the center is deployed closer to the terminal, which directly accelerates the iteration speed of the "sensing-communication-decision-feedback" chain in the complex marine environments, including ship avoidance. The increase in sensor equipment, such as camera...
Article
Full-text available
Every human being has emotion for every item related to them. For every customer, their emotion can help the customer representative to understand their requirement. So, speech emotion recognition plays an important role in the interaction between humans. Now, the intelligent system can help to improve the performance for which we design the convol...
Article
Full-text available
In the advanced applications, based on infrared detection systems, the precise detection of small targets has become a tough work today. This becomes even more difficult when the background is highly dense in addition to the nature of small targets. The problem raised above is solved in various ways, including infrared patch image (IPI) based metho...
Article
Full-text available
Underwater wireless sensor networks (UWSNs) comprise numerous underwater wireless sensor nodes dispersed in the marine environment, which find applicability in several areas like data collection, navigation, resource investigation, surveillance, and disaster prediction. Because of the usage of restricted battery capacity and the difficulty in repla...
Article
Full-text available
Wireless Sensor Networks (WSNs) consist of a spatially distributed set of autonomous connected sensor nodes. The deployed sensor nodes are extensively used for sensing and monitoring for environmental surveillance, military operations, transportation monitoring, and healthcare monitoring. The sensor nodes in these networks have limited resources in...
Article
Full-text available
This paper presents the study of differential evolution algorithm with hierarchical fair competition model (HFC-DE). HFC model is based on the fair competition of societal system found in natural world. In this model, the population is split into hierarchy and the competition is allowed between the hierarchical members. During evolution, the popula...
Article
Peer-to-peer electricity transaction is predicted to play a substantial role in research into future power infrastructures as energy consumption in intelligent microgrids increases. However, the on-demand usage of Energy is a major issue for families to obtain the best cost. This article provides a machine learning predictive power trading framewor...
Article
Full-text available
In this study, the intelligent computational strength of neural networks (NNs) based on the backpropagated Levenberg-Marquardt (BLM) algorithm is utilized to investigate the numerical solution of nonlinear multiorder fractional differential equations (FDEs). The reference data set for the design of the BLM-NN algorithm for different examples of FDE...
Article
Full-text available
Mobile broadband (MBB) is one of the critical goals in fifth-generation (5G) networks due to rising data demand. MBB provides very high-speed internet access with seamless connections. Existing MBB, including third-generation (3G) and fourth-generation (4G) networks, also requires monitoring to ensure good network performance. Thus, performing anal...
Article
Full-text available
In recent years, the underwater wireless sensor network (UWSN) has received a significant interest among research communities for several applications, such as disaster management, water quality prediction, environmental observance, underwater navigation, etc. The UWSN comprises a massive number of sensors placed in rivers and oceans for observing...
Article
Full-text available
Fruit classification is found to be one of the rising fields in computer and machine vision. Many deep learning-based procedures worked out so far to classify images may have some ill-posed issues. The performance of the classification scheme depends on the range of captured images, the volume of features, types of characters, choice of features fr...
Article
Full-text available
The publication of a patient’s dataset is essential for various medical investigations and decision-making. Currently, significant focus has been established to protect privacy during data publishing. The existing privacy models for multiple sensitive attributes do not concentrate on the correlation among the attributes, which in turn leads to much...
Article
Full-text available
All task scheduling applications need to ensure that resources are optimally used, performance is enhanced, and costs are minimized. The purpose of this paper is to discuss how to Fitness Calculate Values (FCVs) to provide application software with a reliable solution during the initial stages of load balancing. The cloud computing environment is t...
Article
Full-text available
In recent times, big data classification has become a hot research topic in various domains, such as healthcare, e-commerce, finance, etc. The inclusion of the feature selection process helps to improve the big data classification process and can be done by the use of metaheuristic optimization algorithms. This study focuses on the design of a big...
Chapter
Full-text available
The main intension of this work is to find the warhead and decoy classification and identification. Classification of radar target is one of the utmost imperatives and hardest practical problems in finding out the missile. Detection of target in the pool of decoys and debris is one of the major radas technologies widely used in practice. In this st...
Article
Full-text available
Mobile ad hoc networks (MANETs) are self-organizing nodes in a mobile network that collaborate to form dynamic network architecture to establish connections. In MANET, data must traverse several intermediary nodes before reaching its destination. There must be security in place to prevent hostile nodes from accessing this data. Multiple methods wer...
Article
Full-text available
In the present industrial revolution era, the industrial mechanical system becomes incessantly highly intelligent and composite. So, it is necessary to develop data-driven and monitoring approaches for achieving quick, trustable, and high-quality analysis in an automated way. Fault diagnosis is an essential process to verify the safety and reliabil...
Article
Full-text available
Blockchain-based electronic health system growth is hindered by privacy, confidentiality, and security. By protecting against them, this research aims to develop cybersecurity measurement approaches to ensure the security and privacy of patient information using blockchain technology in healthcare. Blockchains need huge resources to store big data....
Article
Full-text available
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks (WMANets). There are various routing attacks which harm Ad Hoc networks. This is because of the unse-cure wireless communication, resource constrained capabilities and dynamic topology. In order to cope with these issues, Ad Hoc...
Article
Full-text available
In this paper, a compact bandpass filter with improved band stop and band pass characteristics for wireless applications is built with four internal conductive poles in a single resonating cavity, which adds novel quad-resonating modes to the realization of band pass filter. This paper covers the design and testing of the S-band combline coaxial ca...
Article
The pandemic has accelerated the use and development of video conferenc-ing platforms due to COVID-19, and it is necessary to find an application that best suits our requirements. This article evaluates nine features of nine video conferencing applications to find the best choice. A detailed analysis has been conducted in this article using surveys...
Article
Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Sys...
Article
Full-text available
The present work demonstrates the design and implementation of a human-safe, portable, noninvasive device capable of predicting type 2 diabetes, using electrical bioimpedance and biometric features to train an artificial learning machine using an active learning algorithm based on population selection. In addition, there is an API with a graphical...
Article
Full-text available
Early identification of melanocytic skin lesions increases the survival rate for skin cancer patients. Automated melanocytic skin lesion extraction from dermoscopic images using the computer vision approach is a challenging task as the lesions present in the image can be of different colors, there may be a variation of contrast near the lesion boun...
Article
Full-text available
In sugar production, model parameter estimation and controller tuning of the nonlinear clarification process are major concerns. Because the sugar industry's clarification process is difficult and nonlinear, obtaining the exact model using identification methods is critical. For regulating the clarification process and identifying the model paramet...
Article
The mobility of wireless nodes is one of the key issues of network communication significance and always has been. Researchers are empowered by the rapidly increasing in need of node mobility inside the network without having to lose any link or the data trans-fer. This report concentrated on the technological factors of WPIPv6. The primary objec-t...
Article
Full-text available
Existing methods use static path identifiers, making it easy for attackers to conduct DDoS flooding attacks. Create a system using Dynamic Secure aware Routing by Machine Learning (DAR-ML) to solve healthcare data. A DoS detection system by ML algorithm is proposed in this paper. First, to access the user to see the authorized process. Next, after...
Article
This paper aims to improve the protection of two-wheelers. This study is divided into two parts: a helmet unit and a vehicle unit. The primary unit is the helmet unit, which contains a sensor, and the second part is known as the alcohol sensor, which is used to determine whether or not the driver is wearing the user helmet correctly. This data is t...
Article
An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby associations. One of the significant limits we must focus on in frameworks is leading. As for directions, we can send the packet or communications from the sender to the recipient node. AODV Routing Protocol, a short display that will make the tutorial available o...
Article
Full-text available
The study and exploration of massive multiple-input multiple-output (MMIMO) and millimeter-wave wireless access technology has been spurred by a shortage of bandwidth in the wireless communication sector. Massive MIMO, which combines antennas at the transmitter and receiver, is a key enabler technology for next-generation networks to enable excepti...
Article
Full-text available
Fake reviews, also known as deceptive opinions, are used to mislead people and have gained more importance recently. This is due to the rapid increase in online marketing transactions, such as selling and purchasing. E-commerce provides a facility for customers to post reviews and comment about the product or service when purchased. New customers u...
Article
Full-text available
A Flying Ad-hoc network constitutes many sensor nodes with limited processing speed and storage capacity as they institute a minor battery-driven device with a limited quantity of energy. One of the primary roles of the sensor node is to store and transmit the collected information to the base station (BS). Thus, the life span of the network is the...
Article
Full-text available
Industry 4.0 is a set of technologies that companies require to promote innovation strategies and obtain a rapid response in dynamic markets. It focuses mainly on interconnectivity, digital technology, predictive analytics and machine learning to revolutionize the way companies operate and develop. Therefore, this article proposes and motivates the...
Article
Full-text available
The Industry 4.0 IoT network integration with blockchain architecture is a decentralized, distributed ledger mechanism used to record multi-user transactions. Blockchain requires a data storage system designed to be secure, reliable, and fully transparent, emerged as a preferred IoT-based digital storage on WSN. Blockchain technology is being used...
Article
Full-text available
Mobile ad hoc network (MANETs) is infrastructure-less, self-organizing, fast deployable wireless network, so they truly are exceptionally appropriate for purposes between special outside occasions, communications in locations without a radio infrastructure, crises, and natural disasters, along with military surgeries. Security could be the primary...
Article
Full-text available
In this study, a novel application of neurocomputing technique is presented for solving nonlinear heat transfer and natural convection porous fin problems arising in almost all areas of engineering and technology, especially in mechanical engineering. The mathematical models of the problems are exploited by the intelligent strength of Euler polynom...
Article
Full-text available
Conventional crop insurance systems are complex and often not economically feasible. Farmers are often reluctant to be covered for their crops due to lack of trust in insurance firms and the fear of delayed or non-payment of claims. In this paper, a blockchain based crop insurance solution is suggested. The solution suggested in this paper is an af...
Article
Full-text available
This study implements the VLSI architecture for nonlinear-based picture scaling that is minimal in complexity and memory efficient. Image scaling is used to increase or decrease the size of an image in order to map the resolution of different devices, particularly cameras and printers. Larger memory and greater power are also necessary to produce h...
Article
Full-text available
With the technological advent, the clustering phenomenon is recently being used in various domains and in natural language recognition. is article contributes to the clustering phenomenon of natural language and fulfills the requirements for the dynamic update of the knowledge system. is article proposes a method of dynamic knowledge extraction bas...