• Home
  • Safwan Mawlood Hussein
Safwan Mawlood Hussein

Safwan Mawlood Hussein
Tishk Internationl University · Computer Engineering Department

M.Sc. in computer networking

About

13
Publications
2,274
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
78
Citations
Citations since 2017
10 Research Items
63 Citations
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520

Publications

Publications (13)
Article
Full-text available
The rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of sensor nodes, information gathering, data transmission, and provid...
Article
This work presents a tail-less fully differential bulk-driven transconductance amplifier without using a common-mode feedback (CMFB) circuit. The proposed amplifier employs two P-type and N-type current mirrors to form two self-biasing positive feedback loops resulting in a double transconductance. The bulk terminals of the P-type current mirrors a...
Article
This brief implements a highly efficient fully differential transconductance amplifier, based on several input-to-output paths. Some traditional techniques, such as positive feedback, nonlinear tail current sources, and current mirror-based paths, are combined to increase the transconductance, thus leading to larger dc gain and higher gain bandwidt...
Article
This article presents a low-voltage high-transconductance input differential pair for bulk-driven amplifiers. The proposed structure employs two bulk-driven flipped voltage follower (FVF) cells as nonlinear tail current sources to enhance the slewing behavior. This method also increases the transconductance of the proposed amplifier two times again...
Article
This paper presents an adjustable third-order filter without employing passive elements. The proposed filter combines two low-pass and band-pass MOSFET-only topologies to configure a dual-output structure, while the transconductances and parasitic gate-source capacitances of the transistors act as the required passive elements. The main core of the...
Article
This paper presents a conductance-based neuron that is capable of operating under ultra-low-voltage supplies. The proposed neuron employs a variable-gain low-pass filter to linearly integrate the input spikes onto the membrane capacitance. A positive feedback topology is used to generate output spikes and implement a frequency adaption mechanism. A...
Article
Full-text available
With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology's widespread applications increasing the number of connected devices constantly. IoT is built on sensor networks, which are enabling a new variety of solutions for applications in seve...
Conference Paper
With the rapidly growth of technology, used Internet become an important part in human life it used in many sectors of society, communicating over global network, sending or receiving sensitive data is risk because different techniques are used by attackers to intercept and exposed data. As a result, strong security technique is required to guarant...
Conference Paper
Nowadays Communication through video conferences is becoming a more popular method for individual users, home offices and many businesses since they have been convinced to use it to decrease travel expenses and reduce the gaps of bridge communication, which have been created by distance. Security is one of the most important issues that faces netwo...
Conference Paper
The enormous number of attacks over the Internet nowadays makes the information under potential violation. Intrusion Detection System (IDS) is used as second line of defense to observe suspicious actions going on in computers or network devices. IDS have two approaches by using only one of the approaches only one of the misuse or anomaly attacks ca...

Network

Cited By