no code implementations • 23 Jan 2022 • Hussein K. Alzubaidy, Dhiah Al-Shammary, Mohammed hamzah abed
In this survey, thirty models for steganography and visual encryption methods have been discussed to provide patients privacy protection.
no code implementations • 23 Jan 2022 • Dhurgham Hassan Mahlool, Mohammed hamzah abed
This paper provides a comprehensive study of Federated Learning (FL) with an emphasis on components, challenges, applications and FL environment.
no code implementations • 24 Dec 2020 • Muntasir Al-Asfoor, Mohammed hamzah abed
Simulation results have shown that the search algorithms are performing better under topology adaptation in terms of re-sults quality and search time.
Networking and Internet Architecture
no code implementations • 1 Aug 2020 • Mohammed hamzah abed, Lamia Abed Noor Muhammed, Sarah Hussein Toman
Convolutional Neural Network is one of the promise methods, so it was for Diabetic Retinopathy detection in this paper.
no code implementations • 1 Aug 2020 • Sarah Hussein Toman, Mohammed hamzah abed, Zinah Hussein Toman
Three common datasets (NLP, CISI, and CACM) are used to compute the recall, precision, and F-measure averages.
no code implementations • 31 Jul 2020 • Mohammed Hamzah Abed, Ali H. Alsaeedi, Ali D. Alfoudi, Abayomi M. Otebolaku, Yasmeen Sajid Razooqi
The system has been trained in selecting high reverent features based on the wrapper model.