Education
Master of Science (MSc.)
computr scince
University of Zakho
B.A. Degree in Computers Sciences
College of Education
Duhok University
Title
Assistant Lecturer
Professional Experience
Qualitative & Quantitative Research Company
iraq
DUHOK
Qualitative & Quantitative Research Company for visual checker
Oxford Research International
iraq
DUHOK
Oxford Research International data entry and visual check
Skills
Applications: Microsoft visual studio, php, java script, Bootstrap, CSS, html, OPNET, Cisco Packet Tracer, Windows (Hardware and Software) Microsoft Office Suite, Internet
Full, clean driving license
Interest
I love running, I usually run over 20 miles per week
Regularly play 1-a-side with friends
Publication Journal
Design and implementation of an energy management system based on distributed IoT
Computers and Electrical Engineering (Issue: Part A) (Volume: 109)
A Distributed IoT-based energy management system is planned and executed in this article. We tested the suggested strategy at Duhok and Shekhan, two institutes far apart. Utilizing ESP32 microcontrollers, the suggested system features two main phases (Monitoring and Controlling). There has been carefully monitoring and regulation of all power usage indicators, including Voltage, current, and Frequency. Three primary approaches are taken with each institution: monitoring all metrics for the whole institution, monitoring all metrics for the uncontrolled Lab, and monitoring and regulating all metrics for the controlled Lab. This technology gathers data incessantly, resulting in a large database for energy management. Up to this point, we have collected over two million data rows, and by the end of 2023, we anticipate collecting over ten million. Server-side protocols Message Query Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP) were used to collect the implementation results. According to the implemented findings, one can see that the energy consumption reduction ratios for the Duhok-controlled laboratory were (Weekly = 1.94%, Monthly = 21.65%, and Year-to-Date = 26.38%). There are several critical values recorded during the system's implementation at Shekhan Institute: maximum Voltage (281.2 V), Maximum Frequency (86.3 Hz), and minimum Power-Factor (0.07).
Performance Monitoring and Controlling of Multicore Shared-Memory Parallel Processing Systems
2022 3rd Information Technology To Enhance e-learning and Other Application (IT-ELA)-IEEE
The field of research known as “parallel processing” examines architectural and algorithmic methods for increasing the efficiency and other desirable qualities (such as cost-effectiveness and reliability) of computers by exploiting many forms of concurrency. The development of multi-core CPUs has opened the door to novel strategies for boosting system performance via parallelism. Increasing the number of concurrent threads greatly affects the time cost. While increased parallelism might reduce calculation time, the associated synchronization costs would likely be prohibitive for most applications. In this article, we'll go through the first half of the process, which involves gathering requirements and designing a prototype; the second half, which involves monitoring and managing a program that can run on a wide range of multicore system architectures, including those with (2, 4, and 8 CPUs). A shared-memory parallel processing method was proposed and built to show off the system's full potential. The implications of multi-core systems on overall program execution time and parallel processing in shared-memory systems provide the backbone of this investigation.
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
Computers, Materials & Continua (Issue: 2) (Volume: 75)
Recent economic growth and development have considerably raised energy consumption over the globe. Electric load prediction approaches become essential for effective planning, decision-making, and contract evaluation of the power systems. In order to achieve effective forecasting outcomes with minimum computation time, this study develops an improved whale optimization with deep learning enabled load prediction (IWO-DLELP) scheme for energy storage systems (ESS) in smart grid platform. The major intention of the IWO-DLELP technique is to effectually forecast the electric load in SG environment for designing proficient ESS. The proposed IWO-DLELP model initially undergoes pre-processing in two stages namely min-max normalization and feature selection. Besides, partition clustering approach is applied for the decomposition of data into distinct clusters with respect to distance and objective functions. Moreover, IWO with bidirectional gated recurrent unit (BiGRU) model is applied for the prediction of load and the hyperparameters are tuned by the use of IWO algorithm. The experiment analysis reported the enhanced results of the IWO-DLELP model over the recent methods interms of distinct evaluation measures.
DISTRIBUTED INTERNET OF THINGS INFLUENCE ON MONITORING AND CONTROLLING OF ENERGY MANAGEMENT SYSTEMS: A REVIEW
Journal of Biomechanical Science and Engineering
Today, energy-saving technology is a need in every: home, government, private sectors. This smart savings system focuses primarily on the possibilities of smart home automation technologies. Automation encompasses many technologies that reduce human participation in a system. In recent decades, network-enabled digital technologies for home management and controlling have been significantly introduced. This technology offers an interesting capacity for enhancing the connection of home appliances for the aim of home automation. Developing integrated smart systems such as a smart home using Web-based ideas like the Internet of things (IoT) is simpler. It is essential to ensure that the system is energy-conscious and does not compromise future generations' demands. Smart, linked gadgets are gaining popularity at an accelerating rate. The smart technology market in the developing world is changing to accept and adapt to the linked universe of gadgets that will lead to IoT everywhere. This article offers a sufficient review about the role of distributed IoT on energy management systems aggregators and end-users in smart technology programmers. The importance of the monitoring and controlling stages for these systems is focused well with producing significant numerical outcomes of each addressed system.
Severity Based Light-Weight Encryption Model for Secure Medical Information System
Computers, Materials & Continua (Issue: 3) (Volume: 74)
As the amount of medical images transmitted over networks and kept on online servers continues to rise, the need to protect those images digitally is becoming increasingly important. However, due to the massive amounts of multimedia and medical pictures being exchanged, low computational complexity techniques have been developed. Most commonly used algorithms offer very little security and require a great deal of communication, all of which add to the high processing costs associated with using them. First, a deep learning classifier is used to classify records according to the degree of concealment they require. Medical images that aren’t needed can be saved by using this method, which cuts down on security costs. Encryption is one of the most effective methods for protecting medical images after this step. Confusion and dispersion are two fundamental encryption processes. A new encryption algorithm for very sensitive data is developed in this study. Picture splitting with image blocks is now developed by using Zigzag patterns, rotation of the image blocks, and random permutation for scrambling the blocks. After that, this research suggests a Region of Interest (ROI) technique based on selective picture encryption. For the first step, we use an active contour picture segmentation to separate the ROI from the Region of Background (ROB). Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map. Once all of the blocks have been encrypted, they are combined to create encrypted images. The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.
A Review on Automation Artificial Neural Networks based on Evolutionary Algorithms
2021 14th International Conference on Developments in eSystems Engineering (DeSE)(iEEE)
The biological human brain model was used to inspire the idea of Artificial Neural Networks (ANNs). The notion is then converted into a mathematical formulation and then into machine learning, which is utilized to address various issues throughout the world. Moreover, ANNs has achieved advances in solving numerous intractable problems in several fields in recent times. However, its success depends on the hyper-parameters it selects, and manually fine-tuning them is a time-consuming task. Therefore, automation of the design or topology of artificial neural networks has become a hot issue in both academic and industrial studies. Among the numerous optimization approaches, evolutionary algorithms (EAs) are commonly used to optimize the architecture and parameters of ANNs. We review several successful, well-designed strategies to using EAs to develop artificial neural network architecture that has been published in the last four years in this paper. In addition, we conducted a thorough study and analysis of each publication. Furthermore, details such as methods used, datasets, computer resources, training duration, and performance are summarized for each study. Despite this, the automated neural network techniques performed admirably. However, the long training period and huge computer resources remain issues for these sorts of ANNs techniques.
Web-Based Land Registration Management System: Iraq/Duhok Case Study
Journal of Applied Science and Technology Trends (Issue: 04) (Volume: 2)
In this era, technology is playing a central role in many areas of human life, but the classical hardcopy-based approaches are still being used for land registration. The Internet-based methods provide excellent facilities for overcoming the drawbacks of handwritten-based style and communication among different government sectors. Nowadays, Information and Communication Technology (ICT) is used to build professional electronic systems as big steps towards the electronic government (E-government) system. One of the most critical sections of the E-government is the E-Land-Registration (ELR). Duhok Land Directorate, together with its sub-directorates, works on a considerable amount of data to process. These directorates suffer from the classical hardcopy-based approaches, so building an ELR system will reduce time consumption and paper waste. The improvement of the land registration system will also allow integration with the E-government system. The progress of the land registration will enable communication between the land registration staff on one side and the administration and financial directorates on the other. In this thesis, an efficient ELR system for Duhok land registration is proposed. The services of the database management system cover Employee Registration Module, Estates Registration Module, Operation Type Module, Estate Owners Module, Estate Status Module, View Information Module, and Login Employee Module. HTML, CSS, PHP, MySQL, JavaScript, jQuery, Ajax, and Bootstrap tools were used for the design and implementation stages of the proposed ELR.
Predicting Football Outcomes by Using Poisson Model: Applied to Spanish Primera División
Journal of Applied Science and Technology Trends (Issue: 04) (Volume: 2)
During the past decades, sport in general has become one of the most powerful competitions and the most popular in the world. As well as, everyone is waiting for the winner, and who will be the champion in the end in different tournaments. Among these sports, football popularity is more than all other sports. Football matches results predicting, as well as the champion in various competitions, has been seriously studied in recent years. Moreover, it has become an interest field for many researchers. In this work, the Poisson model has been presented to predict the winner, draw and loser from the football matches. The method is applied to the Spanish Primera División (First Division) in 2016-2017; the data has been downloaded from the football-data.co.uk website, which will be used to find the predict accuracy.
Cloud-based Parallel Computing System Via Single-Client Multi-Hash Single-Server Multi-Thread
2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA)(IEEE)
Parallel Distributed Processing is a relatively new method. Distributed cloud connects data and applications delivered by utilizing cloud computing technologies from several geographical locations. When something is distributed in IT, it is transferred among multiple systems located across diverse areas. The expanse of information besides the interval it takes towards analyzing adding to monitoring projected results efficiently and effectively has been dramatically enhanced. This paper presented a system to assist users in doing composite tasks interactively with the least processing time. Distributed-Parallel-Processing (DPP) and CloudComputing (CC) are the two most great technologies, can process and answer the user problem quickly. Developing a suggested system used several sources (source generators, under-test load, computing machines, and processing units) and (webservers) through the cloud. Hash codes are generated on the client-side and sent towards the webserver. The webserver delivers these does to cracking servers that have been specified. It has been verified that while employing light load (single hash-code) with multi-servers and multiprocessors, the suggested system gives improved efficiency (in terms of Kernel-burst, User-bust, and Total-execution) timings. Although it has been demonstrated that employing large loads (many under-testing codes) with many computing machines using multiprocessors improves the system’s performance. The suggested computational system outperforms it in terms of parallel processing. The proposed method took these situations into account due to the code-breaking influences by two precarious criteria (minimal breaking-time besides cost-effective usage of computer resources).
Design a Clustering Document based Semantic Similarity System using TFIDF and K-Mean
2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA)(IEEE)
The continuing success of the Internet has led to an enormous rise in the volume of electronic text records. The strategies for grouping these records into coherent groups are increasingly important. Traditional text clustering methods are focused on statistical characteristics, with a syntactic rather than semantical concept used to do clustering. A new approach for collecting documentation based on textual similarities is presented in this paper. The method is accomplished by defining, tokenizing, and stopping text synopses from Wikipedia and IMDB datasets using the NLTK dictionary. Then, a vector space is created using TFIDF with the K-mean algorithm to carry out clustering. The results were shown as an interactive website.
Comprehensive Study of Moving from Grid and Cloud Computing Through Fog and Edge Computing towards Dew Computing
2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA)(IEEE)
Dew Computing (DC) is a comparatively modern field with a wide range of applications. By examining how technological advances such as fog, edge and Dew computing, and distributed intelligence force us to reconsider traditional Cloud Computing (CC) to serve the Internet of Things. A new dew estimation theory is presented in this article. The revised definition is as follows: DC is a software and hardware cloud-based company. On-premises servers provide autonomy and collaborate with cloud networks. Dew Calculation aims to enhance the capabilities of on-premises and cloud-based applications. These categories can result in the development of new applications. In the world, there has been rapid growth in Information and Communication Technology (ICT), starting with Grid Computing (GC), CC, Fog Computing (FC), and the latest Edge Computing (EC) technology. DC technologies, infrastructure, and applications are described. We’ll go through the newest developments in fog networking, QoE, cloud at the edge, platforms, security, and privacy. The dew-cloud architecture is an option concerning the current client-server architecture, where two servers are located at opposite ends. In the absence of an Internet connection, a dew server helps users browse and track their details. Data are primarily stored as a local copy on the dew server that starts the Internet and is synchronized with the cloud master copy. The local dew pages, a local online version of the current website, can be browsed, read, written, or added to the users. Mapping between different Local Dew sites has been made possible using the dew domain name scheme and dew domain redirection.
Ultra-Dense Request Impact on Cluster-Based Web Server Performance
2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA)(IEEE)
The objective of this study is to evaluate cluster-based performance under ultra-dense HTTP traffic. This paper provides a performance analysis of the existing load balancing algorithms (Round Robin, Least Connection, and IP-Hash/Source) in cluster-based web servers. The performance testing process is operated with Apache-Jmeter 5.1 and distributing technique to realize ultra-dense load (100000-500000 HTTP requests) in a real network. Generally, the results indicated the proposed Nginx-based cluster is more responsive, stable, and consumes fewer resources concerning Response Time, Throughput, Standard Deviation, and CPU Usage measurements. While in terms of Error Rate, the Apache-based cluster is more efficient. Moreover, with the Nginx-based cluster, the Round Robin algorithm provided slightly better performance. In contrast, the IP-Hash algorithm outperformed the other two algorithms for the Apache-based cluster in terms of all the utilized metrics.
Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study
2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)(IEEE)
Population growth and the creation of new equipment are accompanied by a constant increase in energy use each day and have created significant consumer issues in energy management. Smart meters (SM) are simply instruments for measuring energy usage and are a significant resource of the evolving technological energy management system. Including precise billing data, information on usage at the user end, installation of two-way communication. SM is the critical component of an intelligent power grid. The Internet of Things (IoT) is a critical partner in the power business leading to intelligent resource management to ensure successful data collection and use. This paper proposes designing and analyzing intelligent energy management systems based on Multi-Agent (MA) and Distributed IoT (DIoT). An efficient approach is proposed to monitor and control power consumption levels of the proposed case study of Duhok Polytechnic University (DPU). DPU consists of Presidency, six colleges, and eight institutes. These fifteen campuses are distributed through a wide geographical area with long distances between each campus (i.e., more than 100 Km). A Node represents each campus, and Wi-Fi makes the connection inside each node. These nodes are connected via the Internet to the Main Control Unit (MCU) represented by Raspberry Pi connected to the cloud. Depending on the received data from the Nodes, the MCU will make the correct decision for each node using intelligent algorithms and the user's requirement. Then, control commands are initiated, and the node's appliances can be controlled automatically (or even manually) from the MCU.
State of Art Survey for Deep Learning Effects on Semantic Web Performance
2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)(iEEE)
One of the more significant recent major progress in computer science is the coevolution of deep learning and the Semantic Web. This subject includes research from various perspectives, including using organized information inside the neural network training method or enriching these networks with ontological reasoning mechanisms. By bridging deep learning and the Semantic Web, it is possible to enhance the efficiency of neural networks and open up exciting possibilities in science. This paper presents a comprehensive study of the closest previous researches, which combine the role of Deep Learning and the performance of the Semantic web, which ties together the Semantic Web and deep learning science with their applications. The paper also explains the adoption of an intelligent system in Semantic Deep Learning (SemDeep). As significant results obtained from previous works addressed in this paper, it can be notified that they focussed on real-time detection of phishing websites by HTML Phish. Also, the DnCNN, led by ResNet, achieved the best results, Res-Unit, UNet, and Deeper SRCNN, which recorded 88.5% SSIM, 32.01 percent PSNR 3.90 percent NRMSE.
Embedded System for Eye Blink Detection Using Machine Learning Technique
2021 1st Babylon International Conference on Information Technology and Science (BICITS)(IEEE Xplore) (Issue: -) (Volume: -)
Nowadays, eye tracking and blink detection are increasingly popular among researchers and have the potential to become a more important component of future perceptual user interfaces. The real-time eye-tracking system has been a fundamental and challenging problem for machine learning problems. The main purpose of this paper is to propose a new method to design an embedded eye blink detection system that can be used for various applications with the lowest cost. This study presents an efficient technique to determine the level of eyes that are closed and opened. We offered a real-time blink detection method by using machine learning and computer vision libraries. The proposed method consists of four phases: (1) taking frame by employing a raspberry pi camera that slotted to the raspberry pi 3 platform, (2) utilizing haar cascade algorithm to identify faces in the captured frames, (3) find facial landmarks by utilizing facial landmark detector algorithm, (4) detect the eyes’ region and calculate the eye aspect ratio. The proposed method obtained a high accuracy to indicate eye closing or opening. In this study, an aspect ratio method was used to implement a robust and low-cost embedded eye blink detection system on the raspberry pi platform. This method is exact resourceful, fast, and easy to perform eye blink detection.
Machine Learning-based Diabetic Retinopathy Early Detection and Classification Systems- A Survey
2021 1st Babylon International Conference on Information Technology and Science (BICITS)(IEEE Xplore) (Issue: -) (Volume: -)
Diabetes Mellitus is a chronic disease that spreads quickly worldwide. It results from increasing the blood glucose level and causes complications in the heart, kidney, and eyes. Diabetic Retinopathy (DR) is an eye disease that refers to the bursting of blood vessels in the retina as Diabetes exacerbates. It is considered the main reason for blindness because it appears without showing any symptoms in the primitive stages. Earlier detection and classification of DR cases is a crucial step toward providing the necessary medical treatment. Recently, machine learning plays an efficient role in medical applications and computer-aided diagnosis due to the accelerated development in its algorithms. In this paper, we aim to study the performance of various machine learning algorithms-based DR detection and classification systems. These systems are trained and tested using massive amounts of retina fundus and thermal images from various publicly available datasets. These systems proved their success in tracking down the warning signs and identifying the DR severity level. The reviewed systems' results indicate that ResNet50 deep convolutional neural network was the most effective algorithm for performance metrics. The Resnet50 contains a set of feature extraction kernels that can analyze retina images to extract wealth information. We conclude that machine learning algorithms can support the physician in adopting appropriate diagnoses and treating DR cases.
Clustering Document based Semantic Similarity System using TFIDF and K-Mean
2021 International Conference on Advanced Computer Applications (ACA) (IEEE)
The steady success of the Internet has led to an enormous rise in the volume of electronic text records. Sensitive tasks are increasingly being used to organize these materials in meaningful bundles. The standard clustering approach of documents was focused on statistical characteristics and clustering using the syntactic rather than semantic notion. This paper provides a new way to group documents based on textual similarities. Text synopses are found, identified, and stopped using the NLTK dictionary from Wikipedia and IMDB datasets. The next step is to build a vector space with TFIDF and cluster it using an algorithm K-mean. The results were obtained based on three proposed scenarios: 1) no treatment. 2) preprocessing without derivation, and 3) Derivative processing. The results showed that good similarity ratios were obtained for the internal evaluation when using (txt-sentoken data set) for all K values. In contrast, the best ratio was obtained with K = 20. In addition, as an external evaluation, purity measures were obtained and presented V measure of (txt). -sentoken) and the accuracy scale of (nltk-Reuter) gave the best results in three scenarios for K = 20 as subjective evaluation, the maximum time consumed with the first scenario (no preprocessing), and the minimum time recorded with the second scenario (excluding derivation).
Hybrid Client/Server Peer to Peer Multitier Video Streaming
2021 International Conference on Advanced Computer Applications (ACA) (IEEE)
Real-Time Video Distribution (RTVD) is now the focus of many applications, including video conferencing, surveillance, video broadcasting, etc. This paper introduces a multi-IP camera-based method for distributing video signals to several levels using a hybrid client/server with peer-to-peer. There are four primary functions in the proposed structure: firstly, all linked camera transmissions will be received by the central server, and video signals will be shown to all attached clients and servers in Level two. The second function means that the clients/servers in level two start viewing received video signals and rebroadcasts them to the next level. The third function is clients/servers in level three who receive the video signals from the upper level and rebroadcast them to the fourth level. The fourth level consists of many clients that start viewing received video signals from level three. Therefore, the planned architecture and mechanism of the proposed system can provide the admin the capability to concentrate on the frames obtained from IP cameras to/from the central server. Furthermore, this mechanism can register and store the stream of frames and encode these frames during transmission. The proposed system depended on VC# programming language as a dependent tool that relied on various architectures and algorithms.
Study for Food Recognition System Using Deep Learning
Journal of Physics: Conference Series (Issue: 1) (Volume: 1963)
Accurate dietary appraisal has been found by literature to be very significant in the evaluation of weight loss treatments. Most current methods of dietary evaluation, however, depend on recollection. The development of a modern computer-based food recognition system for reliable food evaluation is now possible across comprehensive mobile devices as well as rich Cloud services. Fixing the problem of food detection and identification in photos of different kinds of foods. Given the variety of food products with low inter-and high intra-class variations and the limited information in a single picture, the problem is complicated. By propose the overall application of multiple fusion-trained classifiers to achieve increased identification and recognition capabilities on characteristics obtained from various deep models. This paper studied various techniques of food recognition using different approaches and based on several variables, compared their effectiveness. Our study results demonstrate that deep learning overcomes other strategies like manual feature extractors, standard ML algorithms, as well as DL as a practical tool for food hygiene and safety inspections.
Study for Food Recognition System Using Deep Learning
Journal of Physics: Conference Series (Issue: 1) (Volume: 1963)
Accurate dietary appraisal has been found by literature to be very significant in the evaluation of weight loss treatments. Most current methods of dietary evaluation, however, depend on recollection. The development of a modern computer-based food recognition system for reliable food evaluation is now possible across comprehensive mobile devices as well as rich Cloud services. Fixing the problem of food detection and identification in photos of different kinds of foods. Given the variety of food products with low inter-and high intra-class variations and the limited information in a single picture, the problem is complicated. By propose the overall application of multiple fusion-trained classifiers to achieve increased identification and recognition capabilities on characteristics obtained from various deep models. This paper studied various techniques of food recognition using different approaches and based on several variables, compared their effectiveness. Our study results demonstrate that deep learning overcomes other strategies like manual feature extractors, standard ML algorithms, as well as DL as a practical tool for food hygiene and safety inspections. Keywords: Food Recognition, Neural Networks, Deep Learning, Classification, Clustering, Feature Selection.
Deep Learning Approaches for Intrusion Detection
Asian Journal of Research in Computer Science (Issue: 4) (Volume: 9)
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS). Moreover, it provides a detailed comparison with evaluating performance, deep learning algorithms for detecting attacks, feature learning, and datasets used to identify the advantages of employing in enhancing network intrusion detection.
An Investigation on Neural Spike Sorting Algorithms
2021 International Conference on Communication & Information Technology (ICICT) (IEEE)
Spike sorting is a technique used to detect signals generated by the neurons of the brain and to classify which spike belongs to which neurons. Spike sorting is one of the most important techniques used by the electrophysiological data processing. Spike Sorting Algorithms (SSA) are created to differentiate the behavior of one or more neurons from background electric noise using waveforms from one or more electrodes in the brain. This sorting comes out as having an essential role in extracting information from extracellular recordings in the neurosciences research community. There are many steps for Spike sorting algorithm (Detection, feature extraction, and Clustering). One of the most important things in spike sorting is the accuracy of the classification for neuron spikes. This article gives a brief overview of the spike sorting algorithm, and the contribution of this paper [email protected] a comprehensive overview of the previous works on the spike sorting [email protected] steps [email protected] (Detection, Feature extraction, and Clustering). The used new techniques to solve the problem of overlapping. On the other hand, previous works used real-time or online spike sorting instead of offline spike sorting. The previous researchers used machine learning algorithms for automatic classification for the spike sorting.
Performance Monitoring for Processes and Threads Execution-Controlling
2021 International Conference on Communication & Information Technology (ICICT) (IEEE)
Strong parallelism can minimize computation time whilst increasing the cost of synchronization. It's vital to keep track of how processes and threads are working. It is understood that thread-based systems improve the productivity of complex operations. Threading makes it easier to the main thread to load, thus enhancing system performance. This paper focuses on the development of a system that has two main stages: monitoring and controlling of a program which have ability to run on a number of multicore system architectures, including those with (2, 4, and 8) CPUs. The algorithms associated with this work are built to provide the ability of: providing dependent computer system information, status checking for all existing processes with their relevant information, and run all possible processes/threads cases that compose the user program that might include one of these cases (Single-Processes/Single-Threads, Single-Process/Multi-Thread, Multi-Process/single-Thread, Multi-Process/Multi-Thread and Multi-Process/ Single-Multi-Thread). The monitoring phase provides complete information on User Program (UP) with all its processes and threads, such as (Name, ID, Elapsed Time, Total CPU Time, CPU usage, User Time, Kernel Time, Priority, RAM size, allocated core, read bytes and read count). The controlling phase controls the processes and threads by suspending/resuming/killing them, modifying their priority, and forcing them to a particular core.
Comparison of software defined networking with traditional networking
Asian Journal of Research in Computer Science (Issue: 2) (Volume: 9)
The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and responding to the load modifications and faults through network reconfiguring. The current networks are likewise vertically incorporated to make matters far more complicated: the control and data planes are bundled collectively. Software-Defined Networking (SDN) is an emerging concept which aims to change this situation by breaking vertical incorporation, promoting the logical centralization of the network control, separating the network control logic from the basic switches and routers, and enabling the network programming. The segregation of concerns identified between the policies concept of network, their implementation in hardware switching and data forwarding is essential to the flexibility required: SDN makes it less complicated and facilitates to make and introduce new concepts in networking through breaking the issue of the network control into tractable parts, simplifies the network management and facilitate the development of the network. In this paper, the SDN is reviewed; it introduces SDN, explaining its core concepts, how it varies from traditional networking, and its architecture principles. Furthermore, we presented the crucial advantages and challenges of SDN, focusing on scalability, security, flexibility, and performance. Finally, a brief conclusion of SDN is revised.
State of art survey for iot effects on smart city technology: challenges, opportunities, and solutions
Asian Journal of Research in Computer Science (Issue: 3) (Volume: 8)
Automation frees workers from excessive human involvement to promote ease of use while still reducing their input of labor. There are about 2 billion people on Earth who live in cities, which means about half of the human population lives in an urban environment. This number is rising which places great problems for a greater number of people, increased traffic, increased noise, increased energy consumption, increased water use, and land pollution, and waste. Thus, the issue of security, coupled with sustainability, is expected to be addressed in cities that use their brain. One of the most often used methodologies for creating a smart city is the Internet of Things (IoT). IoT connectivity is understood to be the very heart of the city of what makes a smart city. such as sensor networks, wearables, mobile apps, and smart grids that have been developed to harness the city's most innovative connectivity technology to provide services and better control its citizens The focus of this research is to clarify and showcase ways in which IoT technology can be used in infrastructure projects for enhancing both productivity and responsiveness.
A comprehensive study of kernel (issues and concepts) in different operating systems
Asian Journal of Research in Computer Science (Issue: 3) (Volume: 8)
Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types of OS to address their flaws. This paper's center of attention is the visual operating system based on the OS features and their limitations and strengths by contrasting iOS, Android, Mac, Windows, and Linux operating systems. Linux, Android, and Windows 10 are more stable, more compatible, and more reliable operating systems. Linux, Android, and Windows are popular enough to become user-friendly, unlike other OSs, and make more application programs. The firewalls in Mac OS X and Windows 10 are built-in. The most popular platforms are Android and Windows, specifically the novelist versions. It is because they are low-cost, dependable, compatible, safe, and easy to use. Furthermore, modern developments in issues resulting from the advent of emerging technology and the growth of the cell phone introduced many features such as high-speed processors, massive memory, multitasking, high-resolution displays, functional telecommunication hardware, and so on.
IoT and ICT based Smart Water Management, Monitoring and Controlling System: A Review
Asian Journal of Research in Computer Science (Issue: 2) (Volume: 8)
Water is a basic human need in all economic operations. Farmland, renewable energy, the industrial industry, and mining are all critical economic areas. Water supplies are under severe strain. With the population increase, the requirement for water from competing economic sectors is increased. So, there is not enough water left to meet human needs and maintain environmental flows that maintain the integrity of our ecosystems. Underground water is becoming depleted in many sectors, making now and future generations near the point of being deprived of protection from the increasing climate variability. Therefore, the critical role that information technology methods and internet communication technologies (ICT) play in water resources managing to limit the excessive waste of fresh water and to control and monitor water pollution. In this paper, we have to review research that uses the internet of things (IoT) as a communication technology that controls the preservation of the available amount of water and not wastes it by homeowners and farmers. In contrast, they use water, and we have also reviewed some researches that preserve water quality and reduce its pollution.
Comprehensive survey for cloud computing based nature-inspired algorithms optimization scheduling
Asian Journal of Research in Computer Science (Issue: 2) (Volume: 8)
Many applications in the real world include optimizing specific targets, such as cost minimization, energy conservation, climate, and maximizing production, efficiency, and sustainability. The optimization problem is strongly non-linear with multifunctional landscapes under several dynamic, non-linear constraints in some instances. It is challenging to address those issues. Also, with the increasing strength of modern computers, simplistic brute force methods are still inefficient and unwanted. Practical algorithms are also vital for these implementations whenever possible.
A Survey of Data Mining Implementation in Smart City Applications
Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)
Many policymakers envisage using a community model and Big Data technology to achieve the sustainability demanded by intelligent city components and raise living standards. Smart cities use different technology to make their residents more successful in their health, housing, electricity, learning, and water supplies. This involves reducing prices and the utilization of resources and communicating more effectively and creatively for our employees. Extensive data analysis is a comparatively modern technology that is capable of expanding intelligent urban facilities. Digital extraction has resulted in the processing of large volumes of data that can be used in several valuable areas since digitalization is an essential part of daily life. In many businesses and utility domains, including the intelligent urban domain, successful exploitation and multiple data use is critical. This paper examines how big data can be used for more innovative societies. It explores the possibilities, challenges, and benefits of applying big data systems in intelligent cities and compares and contrasts different intelligent cities and big data ideas. It also seeks to define criteria for the creation of big data applications for innovative city services.
A state of art survey for intelligent energy monitoring systems
Asian Journal of Research in Computer Science (Issue: 1) (Volume: 8)
In this study, the significance and necessities of surveillance systems have been investigated in several areas-both in the use of neural networks, street lighting systems, factories, and laboratories-for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they can affect any sector and industry reach an essential point from here. Here we reach an important point. An algorithm and an extraordinary approach have been used in every field to develop an intelligent programmer. Something has been mentioned here: the ability to access these intelligent programs in all areas of life. We concentrate on a variety of fields of use and design of monitoring systems in this review article.
A study of moving from cloud computing to fog computing
Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)
The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capacity, and network failure. Cloud computing and Fog computing carry the cloud closer to IoT computers in order to overcome these problems. Cloud and Fog provide IoT processing and storage of IoT items locally instead of sending them to the cloud. Cloud and Fog provide quicker reactions and better efficiency in conjunction with the cloud. Cloud and fog computing should also be viewed as the safest approach to ensure that IoT delivers reliable and stable resources to multiple IoT customers. This article discusses the latest in cloud and Fog computing and their convergence with IoT by stressing deployment's advantages and complexities. It also concentrates on cloud and Fog design and new IoT technologies, enhanced by utilizing the cloud and Fog model. Finally, transparent topics are addressed, along with potential testing recommendations for cloud storage and Fog computing, and IoT.
A Comprehensive Survey of 5G mm-Wave Technology Design Challenges
Asian Journal of Research in Computer Science (Issue: 1) (Volume: 8)
Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated.
A survey of optical fiber communications: challenges and processing time influences
Asian Journal of Research in Computer Science (Issue: 4) (Volume: 7)
Optical fibers are utilized widely for data transmission systems because of their capacity to carry extensive information and dielectric nature. Network architectures utilizing multiple wavelengths per optical fiber are used in central, metropolitan, or broad‐area applications to link thousands of users with a vast range of transmission speeds and capacities. A powerful feature of an optical communication link is sending several wavelengths through the 1300‐to‐1600‐nm range of a fibre simultaneously. The technology of integrating several wavelengths onto a similar fiber is called wavelength division multiplexing (WDM). The principle of WDM utilized in concurrence with optical amplifiers has an outcome in communication links that permit rapid communications among users in the world's countries. This paper presents an overview of the challenges of fibre optic communication. This paper offers an outline of the areas to be the most relevant for the future advancement of optical communications. The invention of integrated optics and modern optical fibers takes place in the field of optical equipment and components.
Energy management for internet of things via distributed systems
Journal of Applied Science and Technology Trends (Issue: 2) (Volume: 2)
The distributed energy system (DES) architecture is subject to confusion about renewable energy limits, primary energy supply and energy carriers' costs. For the grid to use unreliable electricity sources, the end-user's on-demand presence in the intelligent energy management context is essential. The participation of end-users could influence the management of the system and the volatility of energy prices. By delivering auxiliary services using demand side-resource to increase system reliability, robust planning, constraint control and scheduling, consumers may support grid operators. The optimized approach to managing energy resources enhances demand response to renewable energy sources integrally, controls the demand curve with load versatility as the system requires it. The opportunity to adjust/regulate the charging profile by choosing a particular device. This article discusses a literature and policy analysis that looks at the role of energy management system aggregators and the end-users participating in subsidiary systems within Smart Grid programmers and technologies. In the implementation of aggregators for energy management systems, the objective is to understand the patterns, threats, obstacles and potential obstacles.
Multimodal emotion recognition using deep learning
ournal of Applied Science and Technology Trends (Issue: 2) (Volume: 2)
New research into human-computer interaction seeks to consider the consumer's emotional status to provide a seamless human-computer interface. This would make it possible for people to survive and be used in widespread fields, including education and medicine. Multiple techniques can be defined through human feelings, including expressions, facial images, physiological signs, and neuroimaging strategies. This paper presents a review of emotional recognition of multimodal signals using deep learning and comparing their applications based on current studies. Multimodal affective computing systems are studied alongside unimodal solutions as they offer higher accuracy of classification. Accuracy varies according to the number of emotions observed, features extracted, classification system and database consistency. Numerous theories on the methodology of emotional detection and recent emotional science address the following topics. This would encourage studies to understand better physiological signals of the current state of the science and its emotional awareness problems.
Comprehensive survey of big data mining approaches in cloud systems
Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)
Cloud computing, data mining, and big online data are discussed in this paper as hybridization possibilities. The method of analyzing and visualizing vast volumes of data is known as the visualization of data mining. The effect of computing conventions and algorithms on detailed storage and data communication requirements has been studied. When researching these approaches to data storage in big data, the data analytical viewpoint is often explored. These terminology and aspects have been used to address methodological development as well as problem statements. This will assist in the investigation of computational capacity as well as new knowledge in this area. The patterns of using big data were compared in about fifteen articles. In this paper, we research Big Data Mining Approaches in Cloud Systems and address cloud-compatible problems and computing techniques to promote Big Data Mining in Cloud Systems.
A state of art for smart gateways issues and modification
Asian Journal of Research in Computer Science (Issue: 4) (Volume: 7)
The Internet of Things (IoT) is a collection of objects such as sensors, actuators, and processors, which interconnected within a specific network to perform a task collaboratively. The IoT is one of the prevalent technologies, which has developed dramatically in recent years. Its reputation derives from its relevance and role in employing things in the best way, starting with smartphones that opened new horizons in control technologies and later developing new ideas regarding cloud-computing services. A smart gateway plays an essential role in the IoT applications that responsible for enabling communication between the network layer and the ubiquitous sensors network layer. IoT gateways are methods that operate with influential data centers as a point of communication between lower-end users. IoT gateways connect the heterogeneous devices in use and carry out many tasks to accomplish the computing mission. This work searches how IoT gateway's function and how they interact. In particular, it lists interface issues related to IoT gateways. In this paper, we research IoT and Smart Gateways and address Smart Gateways problems and computing techniques to promote IoT programs' stable transition to the Smart Gateway.
Efficiency of malware detection in android system: A survey
Asian Journal of Research in Computer Science (Issue: 4) (Volume: 7)
Smart phones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is more vulnerable and unstable. Identification of Android OS malware has become an emerging research subject of concern. This paper aims to analyze the various characteristics involved in malware detection. It also addresses malware detection methods. The current detection mechanism utilizes algorithms such as Bayesian algorithm, Ada grad algorithm, Naïve Bayes algorithm, Hybrid algorithm, and other algorithms for machine learning to train the sets and find the malware.
Task scheduling algorithms in cloud computing: A review
Turkish Journal of Computer and Mathematics Education (TURCOMAT) (Issue: 4) (Volume: 12)
Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need managing and scheduling these services. The principal idea behind the scheduling is to minimize loss time, workload, and maximize throughput. So, the scheduling task is essential to achieve accuracy and correctness on task completion. This paper gives an idea about various task scheduling algorithms in the cloud computing environment used by researchers. Finally, many authors applied different parameters like completion time, throughput, and cost to evaluate the system.
State of art for semantic analysis of natural language processing
Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)
Semantic analysis is an essential feature of the NLP approach. It indicates, in the appropriate format, the context of a sentence or paragraph. Semantics is about language significance study. The vocabulary used conveys the importance of the subject because of the interrelationship between linguistic classes. In this article, semantic interpretation is carried out in the area of Natural Language Processing. The findings suggest that the best-achieved accuracy of checked papers and those who relied on the Sentiment Analysis approach and the prediction error is minimal.
FPGA implementations for data encryption and decryption via concurrent and parallel computation: A review
Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)
In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. In internet traffic encryption, symmetrical block chips play an essential role. Data Encryption Standard (DES) and Advanced Encryption Standard (AES) ensure privacy encryption underlying data protection standards. The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. DES and AES hardware implementation has many advantages, such as increased performance and improved safety. This paper provides an exhaustive study of the implementation by DES and AES of field programming gate arrays (FPGAs) using both DES and AES. Since FPGAs can be defined as just one mission, computers are superior to them.
IoT and Cloud computing issues, challenges and opportunities: A review
Qubahan Academic Journal (QAJ) (Issue: 2) (Volume: 1)
With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets are constantly producing a vast volume of data. It is unwise to locally store all the raw data in the IIoT devices since the energy and storage spaces of the end devices are strictly constrained. self-organization and short-range Internet of Things (IoT) networking also support outsourced data and cloud computing, independent of the distinctive resource constraint properties. For the remainder of the findings, there is a sequence of unfamiliar safeguards for IoT and cloud integration problems. The delivery of cloud computing is highly efficient, storage is becoming more and more current, and some groups are now altering their data from in house records Cloud Computing Vendors' hubs. Intensive IoT applications for workloads and data are subject to challenges while utilizing cloud computing tools. In this report, we research IoT and cloud computing and address cloud-compatible problems and computing techniques to promote the stable transition of IoT programs to the cloud.
The impact of test case generation methods on the software performance: A review
International Journal of Science and Business (Issue: 6) (Volume: 5)
The software development in different fields leads to increase the requirements for effective, efficient and complicated software. Due to the huge amounts of software requirements, it is possible some errors to occur in the certain part of the programs and this means a real challenge for the software producer. The need for an effective test system is necessary for designing reliable programs and avoiding the errors that may appear during the software product. In this review, many techniques are discussed for the process of generating test cases which are a group of conditions that determine whether the designed programs are able to satisfy the user’s requirements or not. Fuzzy logic utilizes an operational profile in the process of allocating test case to improve the software quality, as well as the design of fault propagation path to predicts the software defects during the test operation, also the automatic generation for PLC test cases that produce a new track through the program code in order to minimize the test cases needed for large size program.
A state of art survey for concurrent computation and clustering of parallel computing for distributed systems
Journal of Applied Science and Technology Trends (Issue: 4) (Volume: 1)
In this paper, several works has been presented related to the clustering parallel computing for distributed system. The trend of the paper is to focus on the strength points of previous works in this field towards enhancing performance of the distributed systems. This concentration conducted via presenting several techniques where each of them has the weak and strong features. The most challenging points for all techniques vary from increasing the performance of the system to time responding to overcome overhead running of the system. For more specific addressing concurrent computation besides parallel computing classifications for distributed systems, this paper depended comprehensive features study and comparison between SYNC and ASYNC Modes.
Clustering documents based on semantic similarity using HAC and K-mean algorithms
2020 International Conference on Advanced Science and Engineering (ICOASE)(IEEE Xplore) (Issue: -) (Volume: -)
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This article introduces a new method for grouping documents based on semantic similarity. This process is accomplished by identifying document summaries from Wikipedia and IMDB datasets, then deriving them using the NLTK dictionary. A vector space afterward is modeled with TFIDF, and the clustering is performed using the HAC and K-mean algorithms. The results are compared and visualized as an interactive webpage.
Neural networks architectures design, and applications: A review
2020 International Conference on Advanced Science and Engineering (ICOASE)(IEEE Xplore) (Issue: -) (Volume: -)
Artificial Neural Networks (ANNs) are modern computing methods that have been used extensively in solving many complicated problems in the physical world. The attractiveness of ANNs stems from its remarkable data processing features, which mainly related to high parallelism, fault and noise resistance, learning and widespread abilities of nonlinearity. This paper introduces a review for some ANNs architectures in the field of recognition, prediction and control to be a useful toolkit and reference for the ANNs modelers. The review mechanism depends on performing a comparison among the newest research in these fields in terms of implemented field, used tools, research technique and significant satisfied aims.
Analyzation Study for Gamification Examination Fields
www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)
This manuscript addresses an approach to track and exam the rate and amount of studies dealt with gamification in different fields and countries. Articles distributed in Science Direct somewhere in the range of 2018 and 2019 partitioned within this examination. However, it resulting good location within gamification of this database. Working on 24 research most of them was about study. Through these examination new examples in gamifications, practices starting late will be settled and another way will be showed up for researchers. Gamifications watch words utilized amidst curious about process and the majority of the articles with gamifications catchphrases were combined into this examination. Because of this exploration, it is resolved that the most examinations in the field of gamifications were distributed in 2018 and 2019 in Brazil. Especially students were chosen as the example gathering of the explores. It is risen that condition and experimental explore was utilized most extreme as an exploration show. Quantitative information gathering devices were utilized most as a method for information accumulation. It was raised that Science and physical and Marketing is the most broadly utilized field in gamifications. Games based strategy supposedly is utilized as the showing technique in the study.
An Investigation for Mobile Malware Behavioral and Detection Techniques Based on Android Platform
IOSR Journal of Computer Engineering (IOSR-JCE) (Issue: 4) (Volume: 22)
Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, it is being clearer when considering that malware and other types with cyberattacks attack such portable structures. Malware has always been an issue regarding any technological advances in the world of software. Smartphones and other mobile devices are thus to be expected to face the same problems. In this paper, mobile malware detection techniques presented in details. Furthermore, we have stated the recent techniques of mobile malware detection. Adding to that, these closest works to the paper objective are compared with respect to the based-portal, depended-approach, and significant system’s description points.
Vaccine Tracker/SMS Reminder System: Design and Implementation
International Journal of Multidisciplinary Research and Publications (Issue: 2) (Volume: 3)
Every era introduces different challenges to healthcare organizations, and the start of the twenty-first century has been no different. Today there is the unprecedented concentration on the quality of health services. A strong health-care system distributes quality services to all people, where and whenever they need it. Vaccination is one of the most important health-care services for the prevention and control of immuno-preventable diseases and, therefore it is essential to keep the vaccine card up-to-date and accessible to enable its benefits. This paper suggests a solution to remind the child’s parents to make an appointment for the next upcoming vaccination. The proposed system sends reminder short messages service (SMS) and an email message to remind the child's parents based on the vaccine schedule recommended in the Kurdistan region. The proposed system aimed at improving completion of the infant primary immunization by Automatic vaccine updates, reminders for free, and track vaccines for multiple babies from the health-care clinical center
Internet of Things and Smart Home Security
https://www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)
This paper deals with the signification of effective technologies for the people. Nowadays, IoT technology is working main role in human life. In recent years, smart home system and smart city security is one based on Internet of Things (IoT) technology, which support and facilitates to monitor the appliances to increase the availability of various gadgets for the aim of home automation with tough security. So that, the IoT has been exploit as one of the key features for the upcoming of wireless sensor network in order to be able to operate without human involvement. In this paper, the most decisive researchers related to security of smart home and smart city system based IoT field has been reviewed and discussed. Significant characteristics of this studies ranges from using platforms, applications to the uses of protocols communication among servers, users and different used tools. in this study we discussed the privacy and security of home to protect from any bad event such theft, fire or any motion happen in spite of if the owner inside or outside home. For this purpose, so many hardware and software object used by various studies.
Impact of Electronic Commerce on Enterprise Business
https://www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)
The aim for this study is discovering the development and impact of E-trade and its consequences for the recent business viewpoints and employment creation. Web based business is developing on fast pace over globally through infiltration the cell telephones. Also, web infiltration over people’s distinctive dimensions internationally. Gains, also gain-growth stay as of now observable from the investigations in created nations, yet when the business going to growing and immature country, greater positive results going forward that would be witnessed by us. A channel of worldwide trade is opening by E-commerce, which observer steady future commercial. Globalizing effects adds to unwinding trendy fare of ingression among countries, frugalities over distributed distance resolve observer recovering learning besides data innovation development and advancements. Notwithstanding the above E-business will assume an essential job in way advertising is done and work markets
Home Automation System based on IoT
www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)
The internet of things (IoT) has been very important when it comes to the automation of smart homes and buildings. In the smart homes and buildings automation, IoT is combined with cloud computing and rule-based event processing to ensure that individuals occupying any premise can enjoy their safety, convenience, and comfort. This study indicates that the use of IoT on smart home automation was fully embraced in the 21st century after commands and controls that were channeled through the electrical wiring had their signals affected by the radio band interference. Iteratively, IoT has been found to have enhanced the smart home automation by ensuring that home appliances and devices can be commanded remotely and at a convenient, safe, and comfortable mode. This study focused on the use of cases of various appliances and devices that are commanded and controlled through the integration of IoT, cloud computing, and rulebased event processing. The appliances that have been considered for this review are fire prevention systems, surveillance cameras, Smart TVs, lighting systems, smart thermostats, Air conditions, doors, fans, Humidity and Gas System. Without the use of IoT, the mentioned appliances and devices have performed haphazardly when it comes to smart home automation. Therefore, this study confirms that the use of IoT has streamlined the performance and the automation of home and building devices and appliances to ensure that they provide effective and efficient safety, comfort, and convenience required for a smart premise.
Evolution of Mobile Wireless Communication to 5G Revolution
https://www.kansaiuniversityreports.com/ (Issue: 5) (Volume: 62)
—Over recent years, the evolution of mobile wireless communication in the world has become more important after arrival 5G technology. This evolution journey consists of several generations start with 1G followed by 2G, 3G, 4G, and under research future generations 5G is still going on. The advancement of remote access innovations is going to achieve 5G mobile systems will focus on the improvement of the client stations anywhere the stations. The fifth era ought to be an increasingly astute innovation that interconnects the whole society by the massive number of objects over the Internet its internet of thing IOT technologies. In this paper present a review of advancement mobile generations by contrasting the type, data transmission rate, challenges, techniques, features and applications used to give by comparing and clarifying the enhancements have been produced till the upcoming 5G revulsion. Also, highlights on innovation 5G its idea, necessities, service, features advantages and applications.
Unified Ontology Implementation of Cloud Computing for Distributed Systems
Current Journal of Applied Science and Technology (Issue: 34) (Volume: 37)
The ability to provide massive data storage, applications, platforms plus many other services leads to make the number of clouds services providers been increased. Providing different types of services and resources by various providers implies to get a high level of complexity. This complexity leads to face many challenges related to security, reliability, discovery, service selection, and interoperability. In this review, we focus on the use of many technologies and methods for utilizing the semantic web and ontology in cloud computing and distributed system as a solution for these challenges. Cloud computing does not have an own search engine to satisfy the needs of the providers of the cloud service. Using ontology enhances the cloud computing self-motivated via an intelligent framework of SaaS and consolidating the security by providing resources access control. The use RDF and OWL semantic technologies in the modeling of a multi-agent system are very effective in increases coordination the interoperability. One of the most efficient proposed frameworks is building cloud computing marketplace that collects the consumer's requirements of cloud services provider and managing these needs and resources to provide quick and reliable services.
Social media networks security threats, risks and recommendation: A case study in the kurdistan region
International Journal of Innovation, Creativity and Change (Issue: 7) (Volume: 13)
It is well known that social media networks have a rapid growth in the number of users, since it is widely adopted as a way of communication, sharing knowledge, sharing thoughts, photos, videos, forming networks and many other features that attract more and more people worldwide. This increase raises the threats and risk consequences because of the lack of cyberculture among users. Moreover, the widespread use of the smartphone with such interesting applications, even for children, raises more problems and an urge for research to be conducted locally to avoid risks. Thus, the paper objective is how to increase the social media sites cyberculture in using social networking and deals with an electronic device such as the smartphone, since the investigation shows that the smartphone is the most widely used compared to others. The paper presents a review on social media sites and their usages together with threats and risks raised by such use. The paper also investigates the awareness of the people in the Kurdistan region about threats and risks through a questionnaire designed and conducted for such purposes. The results show that there is a threat to using social media networks with the need for training to avoid it. Finally, the paper put some recommendations for social media networks on how to reduce threats and risks when individuals share their information on the social media such as Facebook, Twitter, Instagram, snap chat… etc.
Cloud Computing Resources Impacts on Heavy-Load Parallel Processing Approaches
IOSR Journal of Computer Engineering (IOSR-JCE) (Issue: 3) (Volume: 22)
One of the most important subject which many researchers depending on it by applying many algorithms and methods is Cloud Computing. Some of these methods were used to enhance performance, speed, and advantage of task level parallelism and some of these methods used to deal with big data and scheduling. Many others decrease the computation’s quantity in the process of implementation; specially decrease the space of the memory. Parallel data processing is one of the common applications of infrastructure, which is classified as a service in cloud computing. The purpose of this paper is to review parallel processing in cloud. However, the results and methods are inconsistent; therefore, the scheduling concepts give easy method to use the resources and process the data in parallel and decreasing the overall implementation time of processing algorithms. Overall, this review give us and open new doors for using the suitable technique in parallel data processing filed. As a result our work show according to many factors which strategies is better.
Comparison Among Cloud Technologies and Cloud Performance
Journal of Applied Science and Technology Trends (Issue: Vol. 1 No. 2 (2020): June)
The cloud is the best method used for the utilization and organization of data. The cloud provides many resources for us via the internet. There are many technologies used in cloud computing systems; each one uses a different kind of protocols and methods. Many tasks can execute on different servers per second, which cannot execute on their computer. The most popular technologies used in the cloud system are Hadoop, Dryad, and another map reducing framework. Also, there are many tools used to optimize the performance of the cloud system, such as Cap3, HEP, and Cloudburst. This paper reviews in detail the cloud computing system, its used technologies, and the best technologies used with it according to multiple factors and criteria such as the procedure cost, speed cons and pros. Moreover, A comprehensive comparison of the tools used for the utilization of cloud computing systems is presented.
Internet of Things Security: A Survey
IEEE Xplore (Volume: 2018 International Conference on Advanced Science and Engineering (ICOASE))
Internet of Things (IoT) is a huge number of objects which communicate over a network or the Internet. These objects are a combination of electronics, sensors, and a software to control the way of working other parts of the object. Each object generates and collects data from its environment using sensors and transfers them to other objects or a central database through a channel. Keeping this generated data and its transformation is one of the biggest challenges in IoT today and it is one of the biggest concerns of all organizations that they use the IoT technology. In this paper, the most crucial researches related to security in the IoT field have been reviewed and discussed while taking account of the great power of the Quantum Computers. Significant attributes of these studies are compared. IoT security ranges from the software layer security, board and chip, vulnerable cryptography algorithm, protocol and network security, social engineering, malware like (viruses, ransomware, trojan horses). Due to a variety of IoT devices and the rapid emergence of new devices, it is difficult to measure the security of IoT systems and identify risks and vulnerabilities.
Design and Implementation of Electronic Student Affairs System
Academic Journal of Nawroz University (Volume: 7 No 3 (2018))
This paper produces an efficient proposed student affairs system for Duhok Polytechnic University (DPU) called DPU Electronic Student Affairs System (DPU-ESAS). The proposed system consists of thirteen modules that provide four group of services, which are (student services: registration, ID card, postponement, transfer and waiver, certificate of graduation, Non-failure year and absence), (department services: plan acceptance and minimum limits), and (institution service: decisions approving), and (university service: authentication, decision approving and statistics). The proposed DPU-ESAS is designed according to the structure of DPU, which contains two different study systems. These systems are four years studying system depended at the colleges, and two years studying system for the institutes. The obtained results recorded and evaluated via special questionnaires form (system usability scale) that checked by students and staff of the same institutions. The evaluation score of the questionnaire is (72.44%) which can be considered as a good percentage.
Conference
(ICCITM)
Iraq, Iraq/Mosul As Presenter
7th International Conference on Contemporary Information Technology and Mathematics (ICCITM): 1- Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study.
IICPS-IOP
Iraq, Iraq/Babylon As Presenter
Iraqi Academics Syndicate 2nd International Conference for Pure and Applied Sciences (IICPS2021), Babylon Branch, Babylon, Iraq
IICPS-IOP
Iraq, Iraq/Babylon As Presenter
Iraqi Academics Syndicate 2nd International Conference for Pure and Applied Sciences (IICPS2021), Babylon Branch, Babylon, Iraq
IICPS-IOP
Iraq, Iraq/Babylon As Presenter
Iraqi Academics Syndicate 2nd International Conference for Pure and Applied Sciences (IICPS2021), Babylon Branch, Babylon, Iraq
IICETA
Iraq, Iraq/najaf As Presenter
5th International Iraqi Conference on Engineering Technology and its Applications: 1- Ultra-Dense Request Impact on Cluster-Based Web Server Performance.
IICETA
Iraq, Iraq/najaf As Presenter
5th International Iraqi Conference on Engineering Technology and its Applications: 2-Comprehensive Study of Moving from Grid and Cloud Computing Through Fog and Edge Computing towards Dew Computing.
IICETA
Iraq, Iraq/najaf As Presenter
5th International Iraqi Conference on Engineering Technology and its Applications: 3- Design a Semantic Similarity based on Document Clustering using TFIDF and K-mean
ICCITM
Iraq, Iraq/Mosul As Presenter
7th International Conference on Contemporary Information Technology and Mathematics (ICCITM): 2- State of Art Survey for Deep Learning Effects on Semantic Web Performance.
ICICT'2021
Iraq, Iraq/Basra As Presenter
يســـــير التجمع العراقي للاتصالات و تكنولوجيا المعلومات(( ITIG )) بــــدعوة كل من الأساتذة المهتمين بالمشاركة ((المؤتمر العلمي الدولي الثاني للاتصالات وتكنولوجيا المعلومات )) الذي تقيمه كلية العراق الجامعة بالتعاون مع مؤسسة IEEE وفصل العراق IEEE Iraq Comsocو التجمع العراقي الاتصالات و تكنو لوجيا المعلومات ITIG يهدف المؤتمر إلى مناقشة التطورات والتقنيات النظرية والعملية الجديدة في مجالات: ( هندسة الاتصالات، والتحكم، وعلوم الحاسوب، وتكنولوجيا المعلومات وتطبيقاتها في مشاكل العالم الحقيقي ) والذي سيعقد في رحاب كليـة العـراق الجــامعة حضوريا يوم الاحد المصادف 27 حزيران 2021 … وسيكون افتراضيا للبحوث المشاركة في المؤتمر عبر منصة zoom للفترة 27-28 حزيران الجاري لـتسـجيل مـن خـلال الـرابـط الالـكـترونـي الـتـالـي
ICICT'2021
Iraq, Iraq/Basra As Presenter
يســـــير التجمع العراقي للاتصالات و تكنولوجيا المعلومات(( ITIG )) بــــدعوة كل من الأساتذة المهتمين بالمشاركة ((المؤتمر العلمي الدولي الثاني للاتصالات وتكنولوجيا المعلومات )) الذي تقيمه كلية العراق الجامعة بالتعاون مع مؤسسة IEEE وفصل العراق IEEE Iraq Comsocو التجمع العراقي الاتصالات و تكنو لوجيا المعلومات ITIG يهدف المؤتمر إلى مناقشة التطورات والتقنيات النظرية والعملية الجديدة في مجالات: ( هندسة الاتصالات، والتحكم، وعلوم الحاسوب، وتكنولوجيا المعلومات وتطبيقاتها في مشاكل العالم الحقيقي ) والذي سيعقد في رحاب كليـة العـراق الجــامعة حضوريا يوم الاحد المصادف 27 حزيران 2021 … وسيكون افتراضيا للبحوث المشاركة في المؤتمر عبر منصة zoom للفترة 27-28 حزيران الجاري لـتسـجيل مـن خـلال الـرابـط الالـكـترونـي الـتـالـي
2021 1st Babylon International Conference on Information Technology and Science (BICITS)
Iraq, Iraq/Babylon As Presenter
Welcome to the Official Website of the 1st Babylon International Conference on Information Technology and Science (BICITS’21), 17th – 18th March 2021. College of Information Technology/ University of Babylon, Iraq, is holding the 1st Babylon International Conference on Information Technology and Science. This conference is proposed with the idea of an annual ongoing event to invite authors, researchers, and scientists on a single platform to exchange their technical skills, knowledge, ideas, and thoughts. It will definitely evolve as an intellectual asset in the long term years after years. Efforts will be added to make this international conference the best conference in the upcoming years. English is the official language of the conference. Authors are invited to submit full and original research papers that are NOT submitted, published, or under consideration in other journals or conferences. If you need any help please contact us via this mobile: +9647901841495 or email [email protected] , [email protected]
2021 1st Babylon International Conference on Information Technology and Science (BICITS)
Iraq, Iraq/Babylon As Presenter
Welcome to the Official Website of the 1st Babylon International Conference on Information Technology and Science (BICITS’21), 17th – 18th March 2021. College of Information Technology/ University of Babylon, Iraq, is holding the 1st Babylon International Conference on Information Technology and Science. This conference is proposed with the idea of an annual ongoing event to invite authors, researchers, and scientists on a single platform to exchange their technical skills, knowledge, ideas, and thoughts. It will definitely evolve as an intellectual asset in the long term years after years. Efforts will be added to make this international conference the best conference in the upcoming years. English is the official language of the conference. Authors are invited to submit full and original research papers that are NOT submitted, published, or under consideration in other journals or conferences. If you need any help please contact us via this mobile: +9647901841495 or email [email protected] , [email protected]
2020 International Conference on Advanced Science and Engineering (ICOASE)
Iraq, Iraq/Duhok As Presenter
3rd International Conference on Advanced Science and Engineering (ICOASE 2020) A Fully Virtual Conference The current situation regarding the COVID-19 pandemic has caused great distress throughout the world. As the battle with COVID-19 presses on, we believe that our efforts in the field of scientific research and filling the gap in knowledge must continue. We would like to announce that ICOASE 2020 will be held as a Virtual Conference and as scheduled on the 23 – 24 of December 2020. This is to ensure the safety and health of ICOASE delegates while minimizing the impact of COVID-19.
Workshop
Online Platform for Academic Teaching and Learning in Iraq and Iran( OPATEL)
DUHOK As Presenter
OPATEL Activity Online Platform for Academic Teaching and Learning in Iraq and Iran( OPATEL
The Explanation of low of integrity Commission in Kurdistan Region
iraq As Guest
The Explanation of low of integrity Commission in Kurdistan Region
Seminar
علاقة بين نضج الادارة المعرفة والتفوق
presidency, dpu As Attend
Entrepreneurship training course
presidency, dpu As Attend
Care For The Terminal
presidency, dpu As Attend
Matrix
presidency, dpu As Attend
Web 3.0 The Block Chain Technology
presidency, dpu As Attend
Immersion cooling technology
presidency, dpu As Attend
catheterization
presidency, dpu As Attend
sport
presidency, dpu As Attend
the development of markiting
presidency, dpu As Attend
introduction to IoT
presidency, dpu As Presenter
جوانيا نفيسيتا نوجي
presidency, dpu As Attend
grammar agreement
presidency, dpu As Attend
oxygenation saturation
presidency, dpu As Attend
swarm intelligence
presidency, dpu As Attend
reamining with nature
presidency, dpu As Attend
soil colour
presidency, dpu As Attend
E-learning performance via model implementation
Energy, iraq As Attend
OPATEL Role on learning system at DPU
Energy, iraq As Presenter
e-learning &post graduate system
Energy, iraq As Attend
An Introduction to E-Learning
Energy, iraq As Attend
An Introduction to Opatel Project
Energy, iraq As Attend
An Introduction to Opatel Project
Energy, iraq As Attend
Training Course
SKILL Training in (Web Design)
iraq, National
SKILL Training in (Web Design) with Qudra Programmed by HIA and LWF
UNESCO
iraq, National
improving quality of technical and vocational education and training in Kurdistan region .