Education
Sep, 2016
Master of Science (MSc.)

computr scince

University of Zakho

Jul, 2009
B.A. Degree in Computers Sciences

College of Education

Duhok University

Title
Mar, 2019
Assistant Lecturer
Professional Experience
Jun, 2006 - Oct, 2007
Qualitative & Quantitative Research Company

iraq

DUHOK

Qualitative & Quantitative Research Company for visual checker

Jan, 2004 - Mar, 2006
Oxford Research International

iraq

DUHOK

Oxford Research International data entry and visual check

Skills
IT:

Applications: Microsoft visual studio, php, java script, Bootstrap, CSS, html, OPNET, Cisco Packet Tracer, Windows (Hardware and Software) Microsoft Office Suite, Internet

Driving:

Full, clean driving license

Interest
Running:

I love running, I usually run over 20 miles per week

Football:

Regularly play 1-a-side with friends

Publication Journal
May, 2023
Design and implementation of an energy management system based on distributed IoT

Computers and Electrical Engineering (Issue: Part A) (Volume: 109)

A Distributed IoT-based energy management system is planned and executed in this article. We tested the suggested strategy at Duhok and Shekhan, two institutes far apart. Utilizing ESP32 microcontrollers, the suggested system features two main phases (Monitoring and Controlling). There has been carefully monitoring and regulation of all power usage indicators, including Voltage, current, and Frequency. Three primary approaches are taken with each institution: monitoring all metrics for the whole institution, monitoring all metrics for the uncontrolled Lab, and monitoring and regulating all metrics for the controlled Lab. This technology gathers data incessantly, resulting in a large database for energy management. Up to this point, we have collected over two million data rows, and by the end of 2023, we anticipate collecting over ten million. Server-side protocols Message Query Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP) were used to collect the implementation results. According to the implemented findings, one can see that the energy consumption reduction ratios for the Duhok-controlled laboratory were (Weekly = 1.94%, Monthly = 21.65%, and Year-to-Date = 26.38%). There are several critical values recorded during the system's implementation at Shekhan Institute: maximum Voltage (281.2 V), Maximum Frequency (86.3 Hz), and minimum Power-Factor (0.07).

May, 2023
Performance Monitoring and Controlling of Multicore Shared-Memory Parallel Processing Systems

2022 3rd Information Technology To Enhance e-learning and Other Application (IT-ELA)-IEEE

The field of research known as “parallel processing” examines architectural and algorithmic methods for increasing the efficiency and other desirable qualities (such as cost-effectiveness and reliability) of computers by exploiting many forms of concurrency. The development of multi-core CPUs has opened the door to novel strategies for boosting system performance via parallelism. Increasing the number of concurrent threads greatly affects the time cost. While increased parallelism might reduce calculation time, the associated synchronization costs would likely be prohibitive for most applications. In this article, we'll go through the first half of the process, which involves gathering requirements and designing a prototype; the second half, which involves monitoring and managing a program that can run on a wide range of multicore system architectures, including those with (2, 4, and 8 CPUs). A shared-memory parallel processing method was proposed and built to show off the system's full potential. The implications of multi-core systems on overall program execution time and parallel processing in shared-memory systems provide the backbone of this investigation.

Mar, 2023
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems

Computers, Materials & Continua (Issue: 2) (Volume: 75)

Recent economic growth and development have considerably raised energy consumption over the globe. Electric load prediction approaches become essential for effective planning, decision-making, and contract evaluation of the power systems. In order to achieve effective forecasting outcomes with minimum computation time, this study develops an improved whale optimization with deep learning enabled load prediction (IWO-DLELP) scheme for energy storage systems (ESS) in smart grid platform. The major intention of the IWO-DLELP technique is to effectually forecast the electric load in SG environment for designing proficient ESS. The proposed IWO-DLELP model initially undergoes pre-processing in two stages namely min-max normalization and feature selection. Besides, partition clustering approach is applied for the decomposition of data into distinct clusters with respect to distance and objective functions. Moreover, IWO with bidirectional gated recurrent unit (BiGRU) model is applied for the prediction of load and the hyperparameters are tuned by the use of IWO algorithm. The experiment analysis reported the enhanced results of the IWO-DLELP model over the recent methods interms of distinct evaluation measures.

Mar, 2023
DISTRIBUTED INTERNET OF THINGS INFLUENCE ON MONITORING AND CONTROLLING OF ENERGY MANAGEMENT SYSTEMS: A REVIEW

Journal of Biomechanical Science and Engineering

Today, energy-saving technology is a need in every: home, government, private sectors. This smart savings system focuses primarily on the possibilities of smart home automation technologies. Automation encompasses many technologies that reduce human participation in a system. In recent decades, network-enabled digital technologies for home management and controlling have been significantly introduced. This technology offers an interesting capacity for enhancing the connection of home appliances for the aim of home automation. Developing integrated smart systems such as a smart home using Web-based ideas like the Internet of things (IoT) is simpler. It is essential to ensure that the system is energy-conscious and does not compromise future generations' demands. Smart, linked gadgets are gaining popularity at an accelerating rate. The smart technology market in the developing world is changing to accept and adapt to the linked universe of gadgets that will lead to IoT everywhere. This article offers a sufficient review about the role of distributed IoT on energy management systems aggregators and end-users in smart technology programmers. The importance of the monitoring and controlling stages for these systems is focused well with producing significant numerical outcomes of each addressed system.

Dec, 2022
Severity Based Light-Weight Encryption Model for Secure Medical Information System

Computers, Materials & Continua (Issue: 3) (Volume: 74)

As the amount of medical images transmitted over networks and kept on online servers continues to rise, the need to protect those images digitally is becoming increasingly important. However, due to the massive amounts of multimedia and medical pictures being exchanged, low computational complexity techniques have been developed. Most commonly used algorithms offer very little security and require a great deal of communication, all of which add to the high processing costs associated with using them. First, a deep learning classifier is used to classify records according to the degree of concealment they require. Medical images that aren’t needed can be saved by using this method, which cuts down on security costs. Encryption is one of the most effective methods for protecting medical images after this step. Confusion and dispersion are two fundamental encryption processes. A new encryption algorithm for very sensitive data is developed in this study. Picture splitting with image blocks is now developed by using Zigzag patterns, rotation of the image blocks, and random permutation for scrambling the blocks. After that, this research suggests a Region of Interest (ROI) technique based on selective picture encryption. For the first step, we use an active contour picture segmentation to separate the ROI from the Region of Background (ROB). Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map. Once all of the blocks have been encrypted, they are combined to create encrypted images. The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.

Dec, 2021
A Review on Automation Artificial Neural Networks based on Evolutionary Algorithms

2021 14th International Conference on Developments in eSystems Engineering (DeSE)(iEEE)

The biological human brain model was used to inspire the idea of Artificial Neural Networks (ANNs). The notion is then converted into a mathematical formulation and then into machine learning, which is utilized to address various issues throughout the world. Moreover, ANNs has achieved advances in solving numerous intractable problems in several fields in recent times. However, its success depends on the hyper-parameters it selects, and manually fine-tuning them is a time-consuming task. Therefore, automation of the design or topology of artificial neural networks has become a hot issue in both academic and industrial studies. Among the numerous optimization approaches, evolutionary algorithms (EAs) are commonly used to optimize the architecture and parameters of ANNs. We review several successful, well-designed strategies to using EAs to develop artificial neural network architecture that has been published in the last four years in this paper. In addition, we conducted a thorough study and analysis of each publication. Furthermore, details such as methods used, datasets, computer resources, training duration, and performance are summarized for each study. Despite this, the automated neural network techniques performed admirably. However, the long training period and huge computer resources remain issues for these sorts of ANNs techniques.

Nov, 2021
Web-Based Land Registration Management System: Iraq/Duhok Case Study

Journal of Applied Science and Technology Trends (Issue: 04) (Volume: 2)

In this era, technology is playing a central role in many areas of human life, but the classical hardcopy-based approaches are still being used for land registration. The Internet-based methods provide excellent facilities for overcoming the drawbacks of handwritten-based style and communication among different government sectors. Nowadays, Information and Communication Technology (ICT) is used to build professional electronic systems as big steps towards the electronic government (E-government) system. One of the most critical sections of the E-government is the E-Land-Registration (ELR). Duhok Land Directorate, together with its sub-directorates, works on a considerable amount of data to process. These directorates suffer from the classical hardcopy-based approaches, so building an ELR system will reduce time consumption and paper waste. The improvement of the land registration system will also allow integration with the E-government system. The progress of the land registration will enable communication between the land registration staff on one side and the administration and financial directorates on the other. In this thesis, an efficient ELR system for Duhok land registration is proposed. The services of the database management system cover Employee Registration Module, Estates Registration Module, Operation Type Module, Estate Owners Module, Estate Status Module, View Information Module, and Login Employee Module. HTML, CSS, PHP, MySQL, JavaScript, jQuery, Ajax, and Bootstrap tools were used for the design and implementation stages of the proposed ELR.

Nov, 2021
Predicting Football Outcomes by Using Poisson Model: Applied to Spanish Primera División

Journal of Applied Science and Technology Trends (Issue: 04) (Volume: 2)

During the past decades, sport in general has become one of the most powerful competitions and the most popular in the world. As well as, everyone is waiting for the winner, and who will be the champion in the end in different tournaments. Among these sports, football popularity is more than all other sports. Football matches results predicting, as well as the champion in various competitions, has been seriously studied in recent years. Moreover, it has become an interest field for many researchers. In this work, the Poisson model has been presented to predict the winner, draw and loser from the football matches. The method is applied to the Spanish Primera División (First Division) in 2016-2017; the data has been downloaded from the football-data.co.uk website, which will be used to find the predict accuracy.

Oct, 2021
Cloud-based Parallel Computing System Via Single-Client Multi-Hash Single-Server Multi-Thread

2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA)(IEEE)

Parallel Distributed Processing is a relatively new method. Distributed cloud connects data and applications delivered by utilizing cloud computing technologies from several geographical locations. When something is distributed in IT, it is transferred among multiple systems located across diverse areas. The expanse of information besides the interval it takes towards analyzing adding to monitoring projected results efficiently and effectively has been dramatically enhanced. This paper presented a system to assist users in doing composite tasks interactively with the least processing time. Distributed-Parallel-Processing (DPP) and CloudComputing (CC) are the two most great technologies, can process and answer the user problem quickly. Developing a suggested system used several sources (source generators, under-test load, computing machines, and processing units) and (webservers) through the cloud. Hash codes are generated on the client-side and sent towards the webserver. The webserver delivers these does to cracking servers that have been specified. It has been verified that while employing light load (single hash-code) with multi-servers and multiprocessors, the suggested system gives improved efficiency (in terms of Kernel-burst, User-bust, and Total-execution) timings. Although it has been demonstrated that employing large loads (many under-testing codes) with many computing machines using multiprocessors improves the system’s performance. The suggested computational system outperforms it in terms of parallel processing. The proposed method took these situations into account due to the code-breaking influences by two precarious criteria (minimal breaking-time besides cost-effective usage of computer resources).

Sep, 2021
Design a Clustering Document based Semantic Similarity System using TFIDF and K-Mean

2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA)(IEEE)

The continuing success of the Internet has led to an enormous rise in the volume of electronic text records. The strategies for grouping these records into coherent groups are increasingly important. Traditional text clustering methods are focused on statistical characteristics, with a syntactic rather than semantical concept used to do clustering. A new approach for collecting documentation based on textual similarities is presented in this paper. The method is accomplished by defining, tokenizing, and stopping text synopses from Wikipedia and IMDB datasets using the NLTK dictionary. Then, a vector space is created using TFIDF with the K-mean algorithm to carry out clustering. The results were shown as an interactive website.

Sep, 2021
Comprehensive Study of Moving from Grid and Cloud Computing Through Fog and Edge Computing towards Dew Computing

2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA)(IEEE)

Dew Computing (DC) is a comparatively modern field with a wide range of applications. By examining how technological advances such as fog, edge and Dew computing, and distributed intelligence force us to reconsider traditional Cloud Computing (CC) to serve the Internet of Things. A new dew estimation theory is presented in this article. The revised definition is as follows: DC is a software and hardware cloud-based company. On-premises servers provide autonomy and collaborate with cloud networks. Dew Calculation aims to enhance the capabilities of on-premises and cloud-based applications. These categories can result in the development of new applications. In the world, there has been rapid growth in Information and Communication Technology (ICT), starting with Grid Computing (GC), CC, Fog Computing (FC), and the latest Edge Computing (EC) technology. DC technologies, infrastructure, and applications are described. We’ll go through the newest developments in fog networking, QoE, cloud at the edge, platforms, security, and privacy. The dew-cloud architecture is an option concerning the current client-server architecture, where two servers are located at opposite ends. In the absence of an Internet connection, a dew server helps users browse and track their details. Data are primarily stored as a local copy on the dew server that starts the Internet and is synchronized with the cloud master copy. The local dew pages, a local online version of the current website, can be browsed, read, written, or added to the users. Mapping between different Local Dew sites has been made possible using the dew domain name scheme and dew domain redirection.

Sep, 2021
Ultra-Dense Request Impact on Cluster-Based Web Server Performance

2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA)(IEEE)

The objective of this study is to evaluate cluster-based performance under ultra-dense HTTP traffic. This paper provides a performance analysis of the existing load balancing algorithms (Round Robin, Least Connection, and IP-Hash/Source) in cluster-based web servers. The performance testing process is operated with Apache-Jmeter 5.1 and distributing technique to realize ultra-dense load (100000-500000 HTTP requests) in a real network. Generally, the results indicated the proposed Nginx-based cluster is more responsive, stable, and consumes fewer resources concerning Response Time, Throughput, Standard Deviation, and CPU Usage measurements. While in terms of Error Rate, the Apache-based cluster is more efficient. Moreover, with the Nginx-based cluster, the Round Robin algorithm provided slightly better performance. In contrast, the IP-Hash algorithm outperformed the other two algorithms for the Apache-based cluster in terms of all the utilized metrics.

Aug, 2021
Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study

2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)(IEEE)

Population growth and the creation of new equipment are accompanied by a constant increase in energy use each day and have created significant consumer issues in energy management. Smart meters (SM) are simply instruments for measuring energy usage and are a significant resource of the evolving technological energy management system. Including precise billing data, information on usage at the user end, installation of two-way communication. SM is the critical component of an intelligent power grid. The Internet of Things (IoT) is a critical partner in the power business leading to intelligent resource management to ensure successful data collection and use. This paper proposes designing and analyzing intelligent energy management systems based on Multi-Agent (MA) and Distributed IoT (DIoT). An efficient approach is proposed to monitor and control power consumption levels of the proposed case study of Duhok Polytechnic University (DPU). DPU consists of Presidency, six colleges, and eight institutes. These fifteen campuses are distributed through a wide geographical area with long distances between each campus (i.e., more than 100 Km). A Node represents each campus, and Wi-Fi makes the connection inside each node. These nodes are connected via the Internet to the Main Control Unit (MCU) represented by Raspberry Pi connected to the cloud. Depending on the received data from the Nodes, the MCU will make the correct decision for each node using intelligent algorithms and the user's requirement. Then, control commands are initiated, and the node's appliances can be controlled automatically (or even manually) from the MCU.

Aug, 2021
State of Art Survey for Deep Learning Effects on Semantic Web Performance

2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)(iEEE)

One of the more significant recent major progress in computer science is the coevolution of deep learning and the Semantic Web. This subject includes research from various perspectives, including using organized information inside the neural network training method or enriching these networks with ontological reasoning mechanisms. By bridging deep learning and the Semantic Web, it is possible to enhance the efficiency of neural networks and open up exciting possibilities in science. This paper presents a comprehensive study of the closest previous researches, which combine the role of Deep Learning and the performance of the Semantic web, which ties together the Semantic Web and deep learning science with their applications. The paper also explains the adoption of an intelligent system in Semantic Deep Learning (SemDeep). As significant results obtained from previous works addressed in this paper, it can be notified that they focussed on real-time detection of phishing websites by HTML Phish. Also, the DnCNN, led by ResNet, achieved the best results, Res-Unit, UNet, and Deeper SRCNN, which recorded 88.5% SSIM, 32.01 percent PSNR 3.90 percent NRMSE.

Aug, 2021
Embedded System for Eye Blink Detection Using Machine Learning Technique

2021 1st Babylon International Conference on Information Technology and Science (BICITS)(IEEE Xplore) (Issue: -) (Volume: -)

Nowadays, eye tracking and blink detection are increasingly popular among researchers and have the potential to become a more important component of future perceptual user interfaces. The real-time eye-tracking system has been a fundamental and challenging problem for machine learning problems. The main purpose of this paper is to propose a new method to design an embedded eye blink detection system that can be used for various applications with the lowest cost. This study presents an efficient technique to determine the level of eyes that are closed and opened. We offered a real-time blink detection method by using machine learning and computer vision libraries. The proposed method consists of four phases: (1) taking frame by employing a raspberry pi camera that slotted to the raspberry pi 3 platform, (2) utilizing haar cascade algorithm to identify faces in the captured frames, (3) find facial landmarks by utilizing facial landmark detector algorithm, (4) detect the eyes’ region and calculate the eye aspect ratio. The proposed method obtained a high accuracy to indicate eye closing or opening. In this study, an aspect ratio method was used to implement a robust and low-cost embedded eye blink detection system on the raspberry pi platform. This method is exact resourceful, fast, and easy to perform eye blink detection.

Aug, 2021
Machine Learning-based Diabetic Retinopathy Early Detection and Classification Systems- A Survey

2021 1st Babylon International Conference on Information Technology and Science (BICITS)(IEEE Xplore) (Issue: -) (Volume: -)

Diabetes Mellitus is a chronic disease that spreads quickly worldwide. It results from increasing the blood glucose level and causes complications in the heart, kidney, and eyes. Diabetic Retinopathy (DR) is an eye disease that refers to the bursting of blood vessels in the retina as Diabetes exacerbates. It is considered the main reason for blindness because it appears without showing any symptoms in the primitive stages. Earlier detection and classification of DR cases is a crucial step toward providing the necessary medical treatment. Recently, machine learning plays an efficient role in medical applications and computer-aided diagnosis due to the accelerated development in its algorithms. In this paper, we aim to study the performance of various machine learning algorithms-based DR detection and classification systems. These systems are trained and tested using massive amounts of retina fundus and thermal images from various publicly available datasets. These systems proved their success in tracking down the warning signs and identifying the DR severity level. The reviewed systems' results indicate that ResNet50 deep convolutional neural network was the most effective algorithm for performance metrics. The Resnet50 contains a set of feature extraction kernels that can analyze retina images to extract wealth information. We conclude that machine learning algorithms can support the physician in adopting appropriate diagnoses and treating DR cases.

Jul, 2021
Clustering Document based Semantic Similarity System using TFIDF and K-Mean

2021 International Conference on Advanced Computer Applications (ACA) (IEEE)

The steady success of the Internet has led to an enormous rise in the volume of electronic text records. Sensitive tasks are increasingly being used to organize these materials in meaningful bundles. The standard clustering approach of documents was focused on statistical characteristics and clustering using the syntactic rather than semantic notion. This paper provides a new way to group documents based on textual similarities. Text synopses are found, identified, and stopped using the NLTK dictionary from Wikipedia and IMDB datasets. The next step is to build a vector space with TFIDF and cluster it using an algorithm K-mean. The results were obtained based on three proposed scenarios: 1) no treatment. 2) preprocessing without derivation, and 3) Derivative processing. The results showed that good similarity ratios were obtained for the internal evaluation when using (txt-sentoken data set) for all K values. In contrast, the best ratio was obtained with K = 20. In addition, as an external evaluation, purity measures were obtained and presented V measure of (txt). -sentoken) and the accuracy scale of (nltk-Reuter) gave the best results in three scenarios for K = 20 as subjective evaluation, the maximum time consumed with the first scenario (no preprocessing), and the minimum time recorded with the second scenario (excluding derivation).

Jul, 2021
Hybrid Client/Server Peer to Peer Multitier Video Streaming

2021 International Conference on Advanced Computer Applications (ACA) (IEEE)

Real-Time Video Distribution (RTVD) is now the focus of many applications, including video conferencing, surveillance, video broadcasting, etc. This paper introduces a multi-IP camera-based method for distributing video signals to several levels using a hybrid client/server with peer-to-peer. There are four primary functions in the proposed structure: firstly, all linked camera transmissions will be received by the central server, and video signals will be shown to all attached clients and servers in Level two. The second function means that the clients/servers in level two start viewing received video signals and rebroadcasts them to the next level. The third function is clients/servers in level three who receive the video signals from the upper level and rebroadcast them to the fourth level. The fourth level consists of many clients that start viewing received video signals from level three. Therefore, the planned architecture and mechanism of the proposed system can provide the admin the capability to concentrate on the frames obtained from IP cameras to/from the central server. Furthermore, this mechanism can register and store the stream of frames and encode these frames during transmission. The proposed system depended on VC# programming language as a dependent tool that relied on various architectures and algorithms.

Jul, 2021
Study for Food Recognition System Using Deep Learning

Journal of Physics: Conference Series (Issue: 1) (Volume: 1963)

Accurate dietary appraisal has been found by literature to be very significant in the evaluation of weight loss treatments. Most current methods of dietary evaluation, however, depend on recollection. The development of a modern computer-based food recognition system for reliable food evaluation is now possible across comprehensive mobile devices as well as rich Cloud services. Fixing the problem of food detection and identification in photos of different kinds of foods. Given the variety of food products with low inter-and high intra-class variations and the limited information in a single picture, the problem is complicated. By propose the overall application of multiple fusion-trained classifiers to achieve increased identification and recognition capabilities on characteristics obtained from various deep models. This paper studied various techniques of food recognition using different approaches and based on several variables, compared their effectiveness. Our study results demonstrate that deep learning overcomes other strategies like manual feature extractors, standard ML algorithms, as well as DL as a practical tool for food hygiene and safety inspections.

Jul, 2021
Study for Food Recognition System Using Deep Learning

Journal of Physics: Conference Series (Issue: 1) (Volume: 1963)

Accurate dietary appraisal has been found by literature to be very significant in the evaluation of weight loss treatments. Most current methods of dietary evaluation, however, depend on recollection. The development of a modern computer-based food recognition system for reliable food evaluation is now possible across comprehensive mobile devices as well as rich Cloud services. Fixing the problem of food detection and identification in photos of different kinds of foods. Given the variety of food products with low inter-and high intra-class variations and the limited information in a single picture, the problem is complicated. By propose the overall application of multiple fusion-trained classifiers to achieve increased identification and recognition capabilities on characteristics obtained from various deep models. This paper studied various techniques of food recognition using different approaches and based on several variables, compared their effectiveness. Our study results demonstrate that deep learning overcomes other strategies like manual feature extractors, standard ML algorithms, as well as DL as a practical tool for food hygiene and safety inspections. Keywords: Food Recognition, Neural Networks, Deep Learning, Classification, Clustering, Feature Selection.

Jun, 2021
Deep Learning Approaches for Intrusion Detection

Asian Journal of Research in Computer Science (Issue: 4) (Volume: 9)

Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS). Moreover, it provides a detailed comparison with evaluating performance, deep learning algorithms for detecting attacks, feature learning, and datasets used to identify the advantages of employing in enhancing network intrusion detection.

Jun, 2021
An Investigation on Neural Spike Sorting Algorithms

2021 International Conference on Communication & Information Technology (ICICT) (IEEE)

Spike sorting is a technique used to detect signals generated by the neurons of the brain and to classify which spike belongs to which neurons. Spike sorting is one of the most important techniques used by the electrophysiological data processing. Spike Sorting Algorithms (SSA) are created to differentiate the behavior of one or more neurons from background electric noise using waveforms from one or more electrodes in the brain. This sorting comes out as having an essential role in extracting information from extracellular recordings in the neurosciences research community. There are many steps for Spike sorting algorithm (Detection, feature extraction, and Clustering). One of the most important things in spike sorting is the accuracy of the classification for neuron spikes. This article gives a brief overview of the spike sorting algorithm, and the contribution of this paper [email protected] a comprehensive overview of the previous works on the spike sorting [email protected] steps [email protected] (Detection, Feature extraction, and Clustering). The used new techniques to solve the problem of overlapping. On the other hand, previous works used real-time or online spike sorting instead of offline spike sorting. The previous researchers used machine learning algorithms for automatic classification for the spike sorting.

Jun, 2021
Performance Monitoring for Processes and Threads Execution-Controlling

2021 International Conference on Communication & Information Technology (ICICT) (IEEE)

Strong parallelism can minimize computation time whilst increasing the cost of synchronization. It's vital to keep track of how processes and threads are working. It is understood that thread-based systems improve the productivity of complex operations. Threading makes it easier to the main thread to load, thus enhancing system performance. This paper focuses on the development of a system that has two main stages: monitoring and controlling of a program which have ability to run on a number of multicore system architectures, including those with (2, 4, and 8) CPUs. The algorithms associated with this work are built to provide the ability of: providing dependent computer system information, status checking for all existing processes with their relevant information, and run all possible processes/threads cases that compose the user program that might include one of these cases (Single-Processes/Single-Threads, Single-Process/Multi-Thread, Multi-Process/single-Thread, Multi-Process/Multi-Thread and Multi-Process/ Single-Multi-Thread). The monitoring phase provides complete information on User Program (UP) with all its processes and threads, such as (Name, ID, Elapsed Time, Total CPU Time, CPU usage, User Time, Kernel Time, Priority, RAM size, allocated core, read bytes and read count). The controlling phase controls the processes and threads by suspending/resuming/killing them, modifying their priority, and forcing them to a particular core.

May, 2021
Comparison of software defined networking with traditional networking

Asian Journal of Research in Computer Science (Issue: 2) (Volume: 9)

The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and responding to the load modifications and faults through network reconfiguring. The current networks are likewise vertically incorporated to make matters far more complicated: the control and data planes are bundled collectively. Software-Defined Networking (SDN) is an emerging concept which aims to change this situation by breaking vertical incorporation, promoting the logical centralization of the network control, separating the network control logic from the basic switches and routers, and enabling the network programming. The segregation of concerns identified between the policies concept of network, their implementation in hardware switching and data forwarding is essential to the flexibility required: SDN makes it less complicated and facilitates to make and introduce new concepts in networking through breaking the issue of the network control into tractable parts, simplifies the network management and facilitate the development of the network. In this paper, the SDN is reviewed; it introduces SDN, explaining its core concepts, how it varies from traditional networking, and its architecture principles. Furthermore, we presented the crucial advantages and challenges of SDN, focusing on scalability, security, flexibility, and performance. Finally, a brief conclusion of SDN is revised.

May, 2021
State of art survey for iot effects on smart city technology: challenges, opportunities, and solutions

Asian Journal of Research in Computer Science (Issue: 3) (Volume: 8)

Automation frees workers from excessive human involvement to promote ease of use while still reducing their input of labor. There are about 2 billion people on Earth who live in cities, which means about half of the human population lives in an urban environment. This number is rising which places great problems for a greater number of people, increased traffic, increased noise, increased energy consumption, increased water use, and land pollution, and waste. Thus, the issue of security, coupled with sustainability, is expected to be addressed in cities that use their brain. One of the most often used methodologies for creating a smart city is the Internet of Things (IoT). IoT connectivity is understood to be the very heart of the city of what makes a smart city. such as sensor networks, wearables, mobile apps, and smart grids that have been developed to harness the city's most innovative connectivity technology to provide services and better control its citizens The focus of this research is to clarify and showcase ways in which IoT technology can be used in infrastructure projects for enhancing both productivity and responsiveness.

May, 2021
A comprehensive study of kernel (issues and concepts) in different operating systems

Asian Journal of Research in Computer Science (Issue: 3) (Volume: 8)

Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types of OS to address their flaws. This paper's center of attention is the visual operating system based on the OS features and their limitations and strengths by contrasting iOS, Android, Mac, Windows, and Linux operating systems. Linux, Android, and Windows 10 are more stable, more compatible, and more reliable operating systems. Linux, Android, and Windows are popular enough to become user-friendly, unlike other OSs, and make more application programs. The firewalls in Mac OS X and Windows 10 are built-in. The most popular platforms are Android and Windows, specifically the novelist versions. It is because they are low-cost, dependable, compatible, safe, and easy to use. Furthermore, modern developments in issues resulting from the advent of emerging technology and the growth of the cell phone introduced many features such as high-speed processors, massive memory, multitasking, high-resolution displays, functional telecommunication hardware, and so on.

May, 2021
IoT and ICT based Smart Water Management, Monitoring and Controlling System: A Review

Asian Journal of Research in Computer Science (Issue: 2) (Volume: 8)

Water is a basic human need in all economic operations. Farmland, renewable energy, the industrial industry, and mining are all critical economic areas. Water supplies are under severe strain. With the population increase, the requirement for water from competing economic sectors is increased. So, there is not enough water left to meet human needs and maintain environmental flows that maintain the integrity of our ecosystems. Underground water is becoming depleted in many sectors, making now and future generations near the point of being deprived of protection from the increasing climate variability. Therefore, the critical role that information technology methods and internet communication technologies (ICT) play in water resources managing to limit the excessive waste of fresh water and to control and monitor water pollution. In this paper, we have to review research that uses the internet of things (IoT) as a communication technology that controls the preservation of the available amount of water and not wastes it by homeowners and farmers. In contrast, they use water, and we have also reviewed some researches that preserve water quality and reduce its pollution.

May, 2021
Comprehensive survey for cloud computing based nature-inspired algorithms optimization scheduling

Asian Journal of Research in Computer Science (Issue: 2) (Volume: 8)

Many applications in the real world include optimizing specific targets, such as cost minimization, energy conservation, climate, and maximizing production, efficiency, and sustainability. The optimization problem is strongly non-linear with multifunctional landscapes under several dynamic, non-linear constraints in some instances. It is challenging to address those issues. Also, with the increasing strength of modern computers, simplistic brute force methods are still inefficient and unwanted. Practical algorithms are also vital for these implementations whenever possible.

Apr, 2021
A Survey of Data Mining Implementation in Smart City Applications

Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)

Many policymakers envisage using a community model and Big Data technology to achieve the sustainability demanded by intelligent city components and raise living standards. Smart cities use different technology to make their residents more successful in their health, housing, electricity, learning, and water supplies. This involves reducing prices and the utilization of resources and communicating more effectively and creatively for our employees. Extensive data analysis is a comparatively modern technology that is capable of expanding intelligent urban facilities. Digital extraction has resulted in the processing of large volumes of data that can be used in several valuable areas since digitalization is an essential part of daily life. In many businesses and utility domains, including the intelligent urban domain, successful exploitation and multiple data use is critical. This paper examines how big data can be used for more innovative societies. It explores the possibilities, challenges, and benefits of applying big data systems in intelligent cities and compares and contrasts different intelligent cities and big data ideas. It also seeks to define criteria for the creation of big data applications for innovative city services.

Apr, 2021
A state of art survey for intelligent energy monitoring systems

Asian Journal of Research in Computer Science (Issue: 1) (Volume: 8)

In this study, the significance and necessities of surveillance systems have been investigated in several areas-both in the use of neural networks, street lighting systems, factories, and laboratories-for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they can affect any sector and industry reach an essential point from here. Here we reach an important point. An algorithm and an extraordinary approach have been used in every field to develop an intelligent programmer. Something has been mentioned here: the ability to access these intelligent programs in all areas of life. We concentrate on a variety of fields of use and design of monitoring systems in this review article.

Apr, 2021
A study of moving from cloud computing to fog computing

Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)

The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capacity, and network failure. Cloud computing and Fog computing carry the cloud closer to IoT computers in order to overcome these problems. Cloud and Fog provide IoT processing and storage of IoT items locally instead of sending them to the cloud. Cloud and Fog provide quicker reactions and better efficiency in conjunction with the cloud. Cloud and fog computing should also be viewed as the safest approach to ensure that IoT delivers reliable and stable resources to multiple IoT customers. This article discusses the latest in cloud and Fog computing and their convergence with IoT by stressing deployment's advantages and complexities. It also concentrates on cloud and Fog design and new IoT technologies, enhanced by utilizing the cloud and Fog model. Finally, transparent topics are addressed, along with potential testing recommendations for cloud storage and Fog computing, and IoT.

Apr, 2021
A Comprehensive Survey of 5G mm-Wave Technology Design Challenges

Asian Journal of Research in Computer Science (Issue: 1) (Volume: 8)

Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated.

Apr, 2021
A survey of optical fiber communications: challenges and processing time influences

Asian Journal of Research in Computer Science (Issue: 4) (Volume: 7)

Optical fibers are utilized widely for data transmission systems because of their capacity to carry extensive information and dielectric nature. Network architectures utilizing multiple wavelengths per optical fiber are used in central, metropolitan, or broad‐area applications to link thousands of users with a vast range of transmission speeds and capacities. A powerful feature of an optical communication link is sending several wavelengths through the 1300‐to‐1600‐nm range of a fibre simultaneously. The technology of integrating several wavelengths onto a similar fiber is called wavelength division multiplexing (WDM). The principle of WDM utilized in concurrence with optical amplifiers has an outcome in communication links that permit rapid communications among users in the world's countries. This paper presents an overview of the challenges of fibre optic communication. This paper offers an outline of the areas to be the most relevant for the future advancement of optical communications. The invention of integrated optics and modern optical fibers takes place in the field of optical equipment and components.

Apr, 2021
Energy management for internet of things via distributed systems

Journal of Applied Science and Technology Trends (Issue: 2) (Volume: 2)

The distributed energy system (DES) architecture is subject to confusion about renewable energy limits, primary energy supply and energy carriers' costs. For the grid to use unreliable electricity sources, the end-user's on-demand presence in the intelligent energy management context is essential. The participation of end-users could influence the management of the system and the volatility of energy prices. By delivering auxiliary services using demand side-resource to increase system reliability, robust planning, constraint control and scheduling, consumers may support grid operators. The optimized approach to managing energy resources enhances demand response to renewable energy sources integrally, controls the demand curve with load versatility as the system requires it. The opportunity to adjust/regulate the charging profile by choosing a particular device. This article discusses a literature and policy analysis that looks at the role of energy management system aggregators and the end-users participating in subsidiary systems within Smart Grid programmers and technologies. In the implementation of aggregators for energy management systems, the objective is to understand the patterns, threats, obstacles and potential obstacles.

Apr, 2021
Multimodal emotion recognition using deep learning

ournal of Applied Science and Technology Trends (Issue: 2) (Volume: 2)

New research into human-computer interaction seeks to consider the consumer's emotional status to provide a seamless human-computer interface. This would make it possible for people to survive and be used in widespread fields, including education and medicine. Multiple techniques can be defined through human feelings, including expressions, facial images, physiological signs, and neuroimaging strategies. This paper presents a review of emotional recognition of multimodal signals using deep learning and comparing their applications based on current studies. Multimodal affective computing systems are studied alongside unimodal solutions as they offer higher accuracy of classification. Accuracy varies according to the number of emotions observed, features extracted, classification system and database consistency. Numerous theories on the methodology of emotional detection and recent emotional science address the following topics. This would encourage studies to understand better physiological signals of the current state of the science and its emotional awareness problems.

Apr, 2021
Comprehensive survey of big data mining approaches in cloud systems

Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)

Cloud computing, data mining, and big online data are discussed in this paper as hybridization possibilities. The method of analyzing and visualizing vast volumes of data is known as the visualization of data mining. The effect of computing conventions and algorithms on detailed storage and data communication requirements has been studied. When researching these approaches to data storage in big data, the data analytical viewpoint is often explored. These terminology and aspects have been used to address methodological development as well as problem statements. This will assist in the investigation of computational capacity as well as new knowledge in this area. The patterns of using big data were compared in about fifteen articles. In this paper, we research Big Data Mining Approaches in Cloud Systems and address cloud-compatible problems and computing techniques to promote Big Data Mining in Cloud Systems.

Apr, 2021
A state of art for smart gateways issues and modification

Asian Journal of Research in Computer Science (Issue: 4) (Volume: 7)

The Internet of Things (IoT) is a collection of objects such as sensors, actuators, and processors, which interconnected within a specific network to perform a task collaboratively. The IoT is one of the prevalent technologies, which has developed dramatically in recent years. Its reputation derives from its relevance and role in employing things in the best way, starting with smartphones that opened new horizons in control technologies and later developing new ideas regarding cloud-computing services. A smart gateway plays an essential role in the IoT applications that responsible for enabling communication between the network layer and the ubiquitous sensors network layer. IoT gateways are methods that operate with influential data centers as a point of communication between lower-end users. IoT gateways connect the heterogeneous devices in use and carry out many tasks to accomplish the computing mission. This work searches how IoT gateway's function and how they interact. In particular, it lists interface issues related to IoT gateways. In this paper, we research IoT and Smart Gateways and address Smart Gateways problems and computing techniques to promote IoT programs' stable transition to the Smart Gateway.

Apr, 2021
Efficiency of malware detection in android system: A survey

Asian Journal of Research in Computer Science (Issue: 4) (Volume: 7)

Smart phones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is more vulnerable and unstable. Identification of Android OS malware has become an emerging research subject of concern. This paper aims to analyze the various characteristics involved in malware detection. It also addresses malware detection methods. The current detection mechanism utilizes algorithms such as Bayesian algorithm, Ada grad algorithm, Naïve Bayes algorithm, Hybrid algorithm, and other algorithms for machine learning to train the sets and find the malware.

Apr, 2021
Task scheduling algorithms in cloud computing: A review

Turkish Journal of Computer and Mathematics Education (TURCOMAT) (Issue: 4) (Volume: 12)

Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need managing and scheduling these services. The principal idea behind the scheduling is to minimize loss time, workload, and maximize throughput. So, the scheduling task is essential to achieve accuracy and correctness on task completion. This paper gives an idea about various task scheduling algorithms in the cloud computing environment used by researchers. Finally, many authors applied different parameters like completion time, throughput, and cost to evaluate the system.

Mar, 2021
State of art for semantic analysis of natural language processing

Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)

Semantic analysis is an essential feature of the NLP approach. It indicates, in the appropriate format, the context of a sentence or paragraph. Semantics is about language significance study. The vocabulary used conveys the importance of the subject because of the interrelationship between linguistic classes. In this article, semantic interpretation is carried out in the area of Natural Language Processing. The findings suggest that the best-achieved accuracy of checked papers and those who relied on the Sentiment Analysis approach and the prediction error is minimal.

Mar, 2021
FPGA implementations for data encryption and decryption via concurrent and parallel computation: A review

Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)

In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. In internet traffic encryption, symmetrical block chips play an essential role. Data Encryption Standard (DES) and Advanced Encryption Standard (AES) ensure privacy encryption underlying data protection standards. The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. DES and AES hardware implementation has many advantages, such as increased performance and improved safety. This paper provides an exhaustive study of the implementation by DES and AES of field programming gate arrays (FPGAs) using both DES and AES. Since FPGAs can be defined as just one mission, computers are superior to them.

Mar, 2021
IoT and Cloud computing issues, challenges and opportunities: A review

Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)

With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets are constantly producing a vast volume of data. It is unwise to locally store all the raw data in the IIoT devices since the energy and storage spaces of the end devices are strictly constrained. self-organization and short-range Internet of Things (IoT) networking also support outsourced data and cloud computing, independent of the distinctive resource constraint properties. For the remainder of the findings, there is a sequence of unfamiliar safeguards for IoT and cloud integration problems. The delivery of cloud computing is highly efficient, storage is becoming more and more current, and some groups are now altering their data from in house records Cloud Computing Vendors' hubs. Intensive IoT applications for workloads and data are subject to challenges while utilizing cloud computing tools. In this report, we research IoT and cloud computing and address cloud-compatible problems and computing techniques to promote the stable transition of IoT programs to the cloud.

Mar, 2021
The impact of test case generation methods on the software performance: A review

International Journal of Science and Business (Issue: 6) (Volume: 5)

The software development in different fields leads to increase the requirements for effective, efficient and complicated software. Due to the huge amounts of software requirements, it is possible some errors to occur in the certain part of the programs and this means a real challenge for the software producer. The need for an effective test system is necessary for designing reliable programs and avoiding the errors that may appear during the software product. In this review, many techniques are discussed for the process of generating test cases which are a group of conditions that determine whether the designed programs are able to satisfy the user’s requirements or not. Fuzzy logic utilizes an operational profile in the process of allocating test case to improve the software quality, as well as the design of fault propagation path to predicts the software defects during the test operation, also the automatic generation for PLC test cases that produce a new track through the program code in order to minimize the test cases needed for large size program.

Dec, 2020
A state of art survey for concurrent computation and clustering of parallel computing for distributed systems

Journal of Applied Science and Technology Trends (Issue: 4) (Volume: 1)

In this paper, several works has been presented related to the clustering parallel computing for distributed system. The trend of the paper is to focus on the strength points of previous works in this field towards enhancing performance of the distributed systems. This concentration conducted via presenting several techniques where each of them has the weak and strong features. The most challenging points for all techniques vary from increasing the performance of the system to time responding to overcome overhead running of the system. For more specific addressing concurrent computation besides parallel computing classifications for distributed systems, this paper depended comprehensive features study and comparison between SYNC and ASYNC Modes.

Dec, 2020
Clustering documents based on semantic similarity using HAC and K-mean algorithms

2020 International Conference on Advanced Science and Engineering (ICOASE)(IEEE Xplore) (Issue: -) (Volume: -)

The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This article introduces a new method for grouping documents based on semantic similarity. This process is accomplished by identifying document summaries from Wikipedia and IMDB datasets, then deriving them using the NLTK dictionary. A vector space afterward is modeled with TFIDF, and the clustering is performed using the HAC and K-mean algorithms. The results are compared and visualized as an interactive webpage.

Dec, 2020
Neural networks architectures design, and applications: A review

2020 International Conference on Advanced Science and Engineering (ICOASE)(IEEE Xplore) (Issue: -) (Volume: -)

Artificial Neural Networks (ANNs) are modern computing methods that have been used extensively in solving many complicated problems in the physical world. The attractiveness of ANNs stems from its remarkable data processing features, which mainly related to high parallelism, fault and noise resistance, learning and widespread abilities of nonlinearity. This paper introduces a review for some ANNs architectures in the field of recognition, prediction and control to be a useful toolkit and reference for the ANNs modelers. The review mechanism depends on performing a comparison among the newest research in these fields in terms of implemented field, used tools, research technique and significant satisfied aims.

Dec, 2020
Analyzation Study for Gamification Examination Fields

www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)

This manuscript addresses an approach to track and exam the rate and amount of studies dealt with gamification in different fields and countries. Articles distributed in Science Direct somewhere in the range of 2018 and 2019 partitioned within this examination. However, it resulting good location within gamification of this database. Working on 24 research most of them was about study. Through these examination new examples in gamifications, practices starting late will be settled and another way will be showed up for researchers. Gamifications watch words utilized amidst curious about process and the majority of the articles with gamifications catchphrases were combined into this examination. Because of this exploration, it is resolved that the most examinations in the field of gamifications were distributed in 2018 and 2019 in Brazil. Especially students were chosen as the example gathering of the explores. It is risen that condition and experimental explore was utilized most extreme as an exploration show. Quantitative information gathering devices were utilized most as a method for information accumulation. It was raised that Science and physical and Marketing is the most broadly utilized field in gamifications. Games based strategy supposedly is utilized as the showing technique in the study.

Dec, 2020
An Investigation for Mobile Malware Behavioral and Detection Techniques Based on Android Platform

IOSR Journal of Computer Engineering (IOSR-JCE) (Issue: 4) (Volume: 22)

Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, it is being clearer when considering that malware and other types with cyberattacks attack such portable structures. Malware has always been an issue regarding any technological advances in the world of software. Smartphones and other mobile devices are thus to be expected to face the same problems. In this paper, mobile malware detection techniques presented in details. Furthermore, we have stated the recent techniques of mobile malware detection. Adding to that, these closest works to the paper objective are compared with respect to the based-portal, depended-approach, and significant system’s description points.

Dec, 2020
Vaccine Tracker/SMS Reminder System: Design and Implementation

International Journal of Multidisciplinary Research and Publications (Issue: 2) (Volume: 3)

Every era introduces different challenges to healthcare organizations, and the start of the twenty-first century has been no different. Today there is the unprecedented concentration on the quality of health services. A strong health-care system distributes quality services to all people, where and whenever they need it. Vaccination is one of the most important health-care services for the prevention and control of immuno-preventable diseases and, therefore it is essential to keep the vaccine card up-to-date and accessible to enable its benefits. This paper suggests a solution to remind the child’s parents to make an appointment for the next upcoming vaccination. The proposed system sends reminder short messages service (SMS) and an email message to remind the child's parents based on the vaccine schedule recommended in the Kurdistan region. The proposed system aimed at improving completion of the infant primary immunization by Automatic vaccine updates, reminders for free, and track vaccines for multiple babies from the health-care clinical center

Dec, 2020
Internet of Things and Smart Home Security

https://www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)

This paper deals with the signification of effective technologies for the people. Nowadays, IoT technology is working main role in human life. In recent years, smart home system and smart city security is one based on Internet of Things (IoT) technology, which support and facilitates to monitor the appliances to increase the availability of various gadgets for the aim of home automation with tough security. So that, the IoT has been exploit as one of the key features for the upcoming of wireless sensor network in order to be able to operate without human involvement. In this paper, the most decisive researchers related to security of smart home and smart city system based IoT field has been reviewed and discussed. Significant characteristics of this studies ranges from using platforms, applications to the uses of protocols communication among servers, users and different used tools. in this study we discussed the privacy and security of home to protect from any bad event such theft, fire or any motion happen in spite of if the owner inside or outside home. For this purpose, so many hardware and software object used by various studies.

Dec, 2020
Impact of Electronic Commerce on Enterprise Business

https://www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)

The aim for this study is discovering the development and impact of E-trade and its consequences for the recent business viewpoints and employment creation. Web based business is developing on fast pace over globally through infiltration the cell telephones. Also, web infiltration over people’s distinctive dimensions internationally. Gains, also gain-growth stay as of now observable from the investigations in created nations, yet when the business going to growing and immature country, greater positive results going forward that would be witnessed by us. A channel of worldwide trade is opening by E-commerce, which observer steady future commercial. Globalizing effects adds to unwinding trendy fare of ingression among countries, frugalities over distributed distance resolve observer recovering learning besides data innovation development and advancements. Notwithstanding the above E-business will assume an essential job in way advertising is done and work markets

Dec, 2020
Home Automation System based on IoT

www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)

The internet of things (IoT) has been very important when it comes to the automation of smart homes and buildings. In the smart homes and buildings automation, IoT is combined with cloud computing and rule-based event processing to ensure that individuals occupying any premise can enjoy their safety, convenience, and comfort. This study indicates that the use of IoT on smart home automation was fully embraced in the 21st century after commands and controls that were channeled through the electrical wiring had their signals affected by the radio band interference. Iteratively, IoT has been found to have enhanced the smart home automation by ensuring that home appliances and devices can be commanded remotely and at a convenient, safe, and comfortable mode. This study focused on the use of cases of various appliances and devices that are commanded and controlled through the integration of IoT, cloud computing, and rulebased event processing. The appliances that have been considered for this review are fire prevention systems, surveillance cameras, Smart TVs, lighting systems, smart thermostats, Air conditions, doors, fans, Humidity and Gas System. Without the use of IoT, the mentioned appliances and devices have performed haphazardly when it comes to smart home automation. Therefore, this study confirms that the use of IoT has streamlined the performance and the automation of home and building devices and appliances to ensure that they provide effective and efficient safety, comfort, and convenience required for a smart premise.

Dec, 2020
Evolution of Mobile Wireless Communication to 5G Revolution

https://www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)

—Over recent years, the evolution of mobile wireless communication in the world has become more important after arrival 5G technology. This evolution journey consists of several generations start with 1G followed by 2G, 3G, 4G, and under research future generations 5G is still going on. The advancement of remote access innovations is going to achieve 5G mobile systems will focus on the improvement of the client stations anywhere the stations. The fifth era ought to be an increasingly astute innovation that interconnects the whole society by the massive number of objects over the Internet its internet of thing IOT technologies. In this paper present a review of advancement mobile generations by contrasting the type, data transmission rate, challenges, techniques, features and applications used to give by comparing and clarifying the enhancements have been produced till the upcoming 5G revulsion. Also, highlights on innovation 5G its idea, necessities, service, features advantages and applications.

Nov, 2020
Unified Ontology Implementation of Cloud Computing for Distributed Systems

Current Journal of Applied Science and Technology (Issue: 34) (Volume: 37)

The ability to provide massive data storage, applications, platforms plus many other services leads to make the number of clouds services providers been increased. Providing different types of services and resources by various providers implies to get a high level of complexity. This complexity leads to face many challenges related to security, reliability, discovery, service selection, and interoperability. In this review, we focus on the use of many technologies and methods for utilizing the semantic web and ontology in cloud computing and distributed system as a solution for these challenges. Cloud computing does not have an own search engine to satisfy the needs of the providers of the cloud service. Using ontology enhances the cloud computing self-motivated via an intelligent framework of SaaS and consolidating the security by providing resources access control. The use RDF and OWL semantic technologies in the modeling of a multi-agent system are very effective in increases coordination the interoperability. One of the most efficient proposed frameworks is building cloud computing marketplace that collects the consumer's requirements of cloud services provider and managing these needs and resources to provide quick and reliable services.

Jul, 2020
Social media networks security threats, risks and recommendation: A case study in the kurdistan region

International Journal of Innovation, Creativity and Change (Issue: 7) (Volume: 13)

It is well known that social media networks have a rapid growth in the number of users, since it is widely adopted as a way of communication, sharing knowledge, sharing thoughts, photos, videos, forming networks and many other features that attract more and more people worldwide. This increase raises the threats and risk consequences because of the lack of cyberculture among users. Moreover, the widespread use of the smartphone with such interesting applications, even for children, raises more problems and an urge for research to be conducted locally to avoid risks. Thus, the paper objective is how to increase the social media sites cyberculture in using social networking and deals with an electronic device such as the smartphone, since the investigation shows that the smartphone is the most widely used compared to others. The paper presents a review on social media sites and their usages together with threats and risks raised by such use. The paper also investigates the awareness of the people in the Kurdistan region about threats and risks through a questionnaire designed and conducted for such purposes. The results show that there is a threat to using social media networks with the need for training to avoid it. Finally, the paper put some recommendations for social media networks on how to reduce threats and risks when individuals share their information on the social media such as Facebook, Twitter, Instagram, snap chat… etc.

Jun, 2020
Cloud Computing Resources Impacts on Heavy-Load Parallel Processing Approaches

IOSR Journal of Computer Engineering (IOSR-JCE) (Issue: 3) (Volume: 22)

One of the most important subject which many researchers depending on it by applying many algorithms and methods is Cloud Computing. Some of these methods were used to enhance performance, speed, and advantage of task level parallelism and some of these methods used to deal with big data and scheduling. Many others decrease the computation’s quantity in the process of implementation; specially decrease the space of the memory. Parallel data processing is one of the common applications of infrastructure, which is classified as a service in cloud computing. The purpose of this paper is to review parallel processing in cloud. However, the results and methods are inconsistent; therefore, the scheduling concepts give easy method to use the resources and process the data in parallel and decreasing the overall implementation time of processing algorithms. Overall, this review give us and open new doors for using the suitable technique in parallel data processing filed. As a result our work show according to many factors which strategies is better.

Jun, 2020
Comparison Among Cloud Technologies and Cloud Performance

Journal of Applied Science and Technology Trends (Issue: Vol. 1 No. 2 (2020): June)

The cloud is the best method used for the utilization and organization of data. The cloud provides many resources for us via the internet. There are many technologies used in cloud computing systems; each one uses a different kind of protocols and methods. Many tasks can execute on different servers per second, which cannot execute on their computer. The most popular technologies used in the cloud system are Hadoop, Dryad, and another map reducing framework. Also, there are many tools used to optimize the performance of the cloud system, such as Cap3, HEP, and Cloudburst. This paper reviews in detail the cloud computing system, its used technologies, and the best technologies used with it according to multiple factors and criteria such as the procedure cost, speed cons and pros. Moreover, A comprehensive comparison of the tools used for the utilization of cloud computing systems is presented.

Nov, 2018
Internet of Things Security: A Survey

IEEE Xplore (Volume: 2018 International Conference on Advanced Science and Engineering (ICOASE))

Internet of Things (IoT) is a huge number of objects which communicate over a network or the Internet. These objects are a combination of electronics, sensors, and a software to control the way of working other parts of the object. Each object generates and collects data from its environment using sensors and transfers them to other objects or a central database through a channel. Keeping this generated data and its transformation is one of the biggest challenges in IoT today and it is one of the biggest concerns of all organizations that they use the IoT technology. In this paper, the most crucial researches related to security in the IoT field have been reviewed and discussed while taking account of the great power of the Quantum Computers. Significant attributes of these studies are compared. IoT security ranges from the software layer security, board and chip, vulnerable cryptography algorithm, protocol and network security, social engineering, malware like (viruses, ransomware, trojan horses). Due to a variety of IoT devices and the rapid emergence of new devices, it is difficult to measure the security of IoT systems and identify risks and vulnerabilities.

Jun, 2018
Design and Implementation of Electronic Student Affairs System

Academic Journal of Nawroz University (Volume: 7 No 3 (2018))

This paper produces an efficient proposed student affairs system for Duhok Polytechnic University (DPU) called DPU Electronic Student Affairs System (DPU-ESAS). The proposed system consists of thirteen modules that provide four group of services, which are (student services: registration, ID card, postponement, transfer and waiver, certificate of graduation, Non-failure year and absence), (department services: plan acceptance and minimum limits), and (institution service: decisions approving), and (university service: authentication, decision approving and statistics). The proposed DPU-ESAS is designed according to the structure of DPU, which contains two different study systems. These systems are four years studying system depended at the colleges, and two years studying system for the institutes. The obtained results recorded and evaluated via special questionnaires form (system usability scale) that checked by students and staff of the same institutions. The evaluation score of the questionnaire is (72.44%) which can be considered as a good percentage.

Conference
Aug, 2022 - Aug, 2021
(ICCITM)

Iraq, Iraq/Mosul As Presenter

7th International Conference on Contemporary Information Technology and Mathematics (ICCITM): 1- Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study.

Nov, 2021 - Nov, 2021
IICPS-IOP

Iraq, Iraq/Babylon As Presenter

Iraqi Academics Syndicate 2nd International Conference for Pure and Applied Sciences (IICPS2021), Babylon Branch, Babylon, Iraq

Nov, 2021 - Nov, 2021
IICPS-IOP

Iraq, Iraq/Babylon As Presenter

Iraqi Academics Syndicate 2nd International Conference for Pure and Applied Sciences (IICPS2021), Babylon Branch, Babylon, Iraq

Nov, 2021 - Nov, 2021
IICPS-IOP

Iraq, Iraq/Babylon As Presenter

Iraqi Academics Syndicate 2nd International Conference for Pure and Applied Sciences (IICPS2021), Babylon Branch, Babylon, Iraq

Sep, 2021 - Sep, 2021
IICETA

Iraq, Iraq/najaf As Presenter

5th International Iraqi Conference on Engineering Technology and its Applications: 1- Ultra-Dense Request Impact on Cluster-Based Web Server Performance.

Sep, 2021 - Sep, 2021
IICETA

Iraq, Iraq/najaf As Presenter

5th International Iraqi Conference on Engineering Technology and its Applications: 2-Comprehensive Study of Moving from Grid and Cloud Computing Through Fog and Edge Computing towards Dew Computing.

Sep, 2021 - Sep, 2021
IICETA

Iraq, Iraq/najaf As Presenter

5th International Iraqi Conference on Engineering Technology and its Applications: 3- Design a Semantic Similarity based on Document Clustering using TFIDF and K-mean

Aug, 2021 - Aug, 2021
ICCITM

Iraq, Iraq/Mosul As Presenter

7th International Conference on Contemporary Information Technology and Mathematics (ICCITM): 2- State of Art Survey for Deep Learning Effects on Semantic Web Performance.

Jun, 2021 - Jun, 2021
ICICT'2021

Iraq, Iraq/Basra As Presenter

يســـــير التجمع العراقي للاتصالات و تكنولوجيا المعلومات(( ITIG )) بــــدعوة كل من الأساتذة المهتمين بالمشاركة ((المؤتمر العلمي الدولي الثاني للاتصالات وتكنولوجيا المعلومات )) الذي تقيمه كلية العراق الجامعة بالتعاون مع مؤسسة IEEE وفصل العراق IEEE Iraq Comsocو التجمع العراقي الاتصالات و تكنو لوجيا المعلومات ITIG يهدف المؤتمر إلى مناقشة التطورات والتقنيات النظرية والعملية الجديدة في مجالات: ( هندسة الاتصالات، والتحكم، وعلوم الحاسوب، وتكنولوجيا المعلومات وتطبيقاتها في مشاكل العالم الحقيقي ) والذي سيعقد في رحاب كليـة العـراق الجــامعة حضوريا يوم الاحد المصادف 27 حزيران 2021 … وسيكون افتراضيا للبحوث المشاركة في المؤتمر عبر منصة zoom للفترة 27-28 حزيران الجاري لـتسـجيل مـن خـلال الـرابـط الالـكـترونـي الـتـالـي

Jun, 2021 - Jun, 2021
ICICT'2021

Iraq, Iraq/Basra As Presenter

يســـــير التجمع العراقي للاتصالات و تكنولوجيا المعلومات(( ITIG )) بــــدعوة كل من الأساتذة المهتمين بالمشاركة ((المؤتمر العلمي الدولي الثاني للاتصالات وتكنولوجيا المعلومات )) الذي تقيمه كلية العراق الجامعة بالتعاون مع مؤسسة IEEE وفصل العراق IEEE Iraq Comsocو التجمع العراقي الاتصالات و تكنو لوجيا المعلومات ITIG يهدف المؤتمر إلى مناقشة التطورات والتقنيات النظرية والعملية الجديدة في مجالات: ( هندسة الاتصالات، والتحكم، وعلوم الحاسوب، وتكنولوجيا المعلومات وتطبيقاتها في مشاكل العالم الحقيقي ) والذي سيعقد في رحاب كليـة العـراق الجــامعة حضوريا يوم الاحد المصادف 27 حزيران 2021 … وسيكون افتراضيا للبحوث المشاركة في المؤتمر عبر منصة zoom للفترة 27-28 حزيران الجاري لـتسـجيل مـن خـلال الـرابـط الالـكـترونـي الـتـالـي

Apr, 2021 - Apr, 2021
2021 1st Babylon International Conference on Information Technology and Science (BICITS)

Iraq, Iraq/Babylon As Presenter

Welcome to the Official Website of the 1st Babylon International Conference on Information Technology and Science (BICITS’21), 17th – 18th March 2021. College of Information Technology/ University of Babylon, Iraq, is holding the 1st Babylon International Conference on Information Technology and Science. This conference is proposed with the idea of an annual ongoing event to invite authors, researchers, and scientists on a single platform to exchange their technical skills, knowledge, ideas, and thoughts. It will definitely evolve as an intellectual asset in the long term years after years. Efforts will be added to make this international conference the best conference in the upcoming years. English is the official language of the conference. Authors are invited to submit full and original research papers that are NOT submitted, published, or under consideration in other journals or conferences. If you need any help please contact us via this mobile: +9647901841495 or email [email protected] , [email protected]

Apr, 2021 - Apr, 2021
2021 1st Babylon International Conference on Information Technology and Science (BICITS)

Iraq, Iraq/Babylon As Presenter

Welcome to the Official Website of the 1st Babylon International Conference on Information Technology and Science (BICITS’21), 17th – 18th March 2021. College of Information Technology/ University of Babylon, Iraq, is holding the 1st Babylon International Conference on Information Technology and Science. This conference is proposed with the idea of an annual ongoing event to invite authors, researchers, and scientists on a single platform to exchange their technical skills, knowledge, ideas, and thoughts. It will definitely evolve as an intellectual asset in the long term years after years. Efforts will be added to make this international conference the best conference in the upcoming years. English is the official language of the conference. Authors are invited to submit full and original research papers that are NOT submitted, published, or under consideration in other journals or conferences. If you need any help please contact us via this mobile: +9647901841495 or email [email protected] , [email protected]

Dec, 2020 - Dec, 2020
2020 International Conference on Advanced Science and Engineering (ICOASE)

Iraq, Iraq/Duhok As Presenter

3rd International Conference on Advanced Science and Engineering (ICOASE 2020) A Fully Virtual Conference The current situation regarding the COVID-19 pandemic has caused great distress throughout the world. As the battle with COVID-19 presses on, we believe that our efforts in the field of scientific research and filling the gap in knowledge must continue. We would like to announce that ICOASE 2020 will be held as a Virtual Conference and as scheduled on the 23 – 24 of December 2020. This is to ensure the safety and health of ICOASE delegates while minimizing the impact of COVID-19.

Oct, 2018 - Oct, 2018
ICOASE2018

IRAQ, DUHOK-ZAKHO As Presenter

IEEE Conferences

Workshop
Apr, 2019 - Apr, 2019
Online Platform for Academic Teaching and Learning in Iraq and Iran( OPATEL)

DUHOK As Presenter

OPATEL Activity Online Platform for Academic Teaching and Learning in Iraq and Iran( OPATEL

Oct, 2018 - Oct, 2018
IEEE Workshop

iraq As Presenter

Workshop about internet of things

Dec, 2016 - Dec, 2016
The Explanation of low of integrity Commission in Kurdistan Region

iraq As Guest

The Explanation of low of integrity Commission in Kurdistan Region

Seminar
May, 2022
Entrepreneurship training course

presidency, dpu As Attend

May, 2022
Care For The Terminal

presidency, dpu As Attend

May, 2022
Matrix

presidency, dpu As Attend

May, 2022
Web 3.0 The Block Chain Technology

presidency, dpu As Attend

May, 2022
Immersion cooling technology

presidency, dpu As Attend

Mar, 2022
catheterization

presidency, dpu As Attend

Mar, 2022
sport

presidency, dpu As Attend

Mar, 2022
the development of markiting

presidency, dpu As Attend

Mar, 2022
introduction to IoT

presidency, dpu As Presenter

Mar, 2022
جوانيا نفيسيتا نوجي

presidency, dpu As Attend

Mar, 2022
grammar agreement

presidency, dpu As Attend

Mar, 2022
oxygenation saturation

presidency, dpu As Attend

Feb, 2022
swarm intelligence

presidency, dpu As Attend

Feb, 2022
reamining with nature

presidency, dpu As Attend

Feb, 2022
soil colour

presidency, dpu As Attend

Apr, 2019
Mar, 2019
OPATEL Role on learning system at DPU

Energy, iraq As Presenter

Jan, 2019
e-learning &post graduate system

Energy, iraq As Attend

Nov, 2018
An Introduction to E-Learning

Energy, iraq As Attend

Apr, 2018
An Introduction to Opatel Project

Energy, iraq As Attend

Apr, 2018
An Introduction to Opatel Project

Energy, iraq As Attend

Training Course
Jul, 2019 - Jul, 2019
OPATEL

GERMANY, International

Learning Management System

Sep, 2018 - Oct, 2018
SKILL Training in (Web Design)

iraq, National

SKILL Training in (Web Design) with Qudra Programmed by HIA and LWF

Mar, 2017 - Mar, 2017
Mendeley

iraq, National

journal publication and mendeley desktop software

Sep, 2016 - Apr, 2017
Teaching Methods and Research Methodology

iraq, National

Teaching Methods and Research Methodology

Feb, 2012 - Jul, 2019
UNESCO

iraq, National

improving quality of technical and vocational education and training in Kurdistan region .

Error
500

Whoops, something went wrong on our servers.