| الإنجليزية | العربية | الرئسية | تسجيل الدخول |

البحوث العلمية

2023

A Comprehensive Overview of Handwritten Recognition Techniques: A Survey

2023-07
Journal of Computer Science (القضية : 05) (الحجم : 19)
Deep learning and deep neural networks, particularly Convolutional Neural Networks (CNNs), are rapidly growing areas of machine learning and are currently the primary tools used for image analysis and classification applications. Handwriting recognition involves using computer algorithms and software to interpret and recognize handwritten text and drawings and has various applications such as automated handwriting analysis, document digitization, and handwriting-based user interfaces. Many deep learning models have been applied in the field of handwriting recognition and various datasets have been used to evaluate new computer vision techniques. This article provides an overview of the current state-of-the-art approaches and contributions to handwriting recognition using different datasets. Furthermore, the paper explains the most commonly used algorithms for recognizing handwritten characters, words, and numbers. Compares them based on their accuracy. This study covered different aspects and methods of machine learning and Deep Learning (DL) for handwritten recognition that showed different achievements for each.

Web-Based Agricultural Management Products for Marketing System: Survey

2023-04
Academic Journal of Nawroz University (AJNU) (القضية : 02) (الحجم : 12)
The development of information systems motivated scientists to use their knowledge to improve new tactics that can provide competitive advantages in a highly complex environment, primarily in the management of agricultural products marketing systems. Farmers often blame marketing issues for their struggles. Poor prices, a lack of transportation, and substantial post-harvest losses are all issues that they can recognize, but they are typically ill-equipped to solve. Modern technology, particularly Internet and mobile connectivity, makes it easier for people to do their work across a wide range of activities,including economics, commerce, marketing, and agriculture. Agricultural Information Management Systems (AIMS) are becoming more popular as a useful sector as agriculture expands and becomes one of the world's most lucrative enterprises. In recent years, people have become increasingly dependent on this technology. Systems have evolved from passively absorbing information to actively incorporating users as an important part of the system. The goal of this research is to clarify and exhibit that different kind of systems employed by various agricultural-related authorities had a good probable influence on their operations by making duties simpler for their personnel. Specifically, the study focuses on displaying this information. In addition, the research analyzes the primary distinctions between these studies by contrasting many of them, with the goal of gaining an understanding of the foundational advantages that may be used by new researchers that are interested in developing new AIMS, And in order to fully comprehend websites, researchers are combining quantitative and qualitative approaches. Numerous analyses of agricultural product websites have been conducted, using a wide range of approaches. Study 26 investigated whether farmers' and retailers' use of web-based technology facilitated the display and sale of goods.
2022

Fuzzy logic system for drug storage based on the internet of things: a survey

2022-12
Indonesian Journal of Electrical Engineering and Computer Science (القضية : 3) (الحجم : 29)
The rapid development of internet of things (IoT) technology over the course of recent history has made it possible to connect a large number of smart things and sensors, as well as to establish an environment in which data can be seamlessly exchanged between them. This has led to an increase in the demand for data analysis and storage platforms such as cloud computing and fog computing. One of the application areas for the internet of things that has garnered a lot of interest from the business world, academic institutions, and the government is healthcare. The IoT and fuzzy logic are being used in the medical business to improve patient safety, the overall quality of care, and the overall efficiency of medical operations. The most important healthcare studies that are pertinent to pharmacies have been used as the basis for this research. The purpose of this research is to investigate recent advancements in medical modules, remotes, and detector patterns, as well as current innovations in IoT and fuzzy logic-based health care, and current policies from around the world, with the intention of determining how well they support the long-term growth of IoT and fuzzy logic in healthcare.

Analyses the Performance of Data Warehouse Architecture Types

2022-06
JOURNAL OF SOFT COMPUTING AND DATA MINING (القضية : 1) (الحجم : 3)
The concept of storing historical data for retrieving them when needed has been conceived, and the idea was primitive to build repositories for historical data to store these data, despite the use of a specific technique for recovering these data from various storage modes. The data warehouse is the most reliable and widely used technology for scheduling, forecasting, and managing corporations. Also, it is concerned with the data storage facility that extensive collection of data. Data warehouses are called ancient modern techniques; since the early days of relational databases, the critical component of decision support, increasing focus for the database industry. Many commercial products and services are now available, and almost all of the primary database management system vendors provide them. When opposed to conventional online transaction processing applications, decision support puts slightly different demands on database technology. This paper analyzes the performance of the data warehouse architectures by studying and comparing many research works in this field. The study involves extracting, transforming, and loading the data from different recourses and the important characteristic of the architecture types. Furthermore, the tools and application service techniques used to build data warehouse architecture.
2021

A state of art survey for intelligent energy monitoring systems

2021-04
Asian Journal of Research in Computer Science (القضية : 1) (الحجم : 8)
In this study, the significance and necessities of surveillance systems have been investigated in several areas-both in the use of neural networks, street lighting systems, factories, and laboratories-for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they can affect any sector and industry reach an essential point from here. Here we reach an important point. An algorithm and an extraordinary approach have been used in every field to develop an intelligent programmer. Something has been mentioned here: the ability to access these intelligent programs in all areas of life. We concentrate on a variety of fields of use and design of monitoring systems in this review article.
2020

Client/Server Remote Control Administration System: Design and Implementation

2020-11
Int. J. Multidiscip. Res. Publ (القضية : 2) (الحجم : 3)
Networks of computers are everywhere, and it implemented in all sectors, including an IT, industrial, managerial sector, and need to be accessed remotely. Remote administration offers access to a remote device. As more departments of Information Technology centralize and reorganize to keep costs down, many remote sites are left with no IT support on-site. Remote computer administration is increasingly common due to the major cost advantages; many activities can be completed, and not needs to be personally accessed by the administrator. In this paper, the remotecontrol administration system has designed and implemented based on client/server architecture. The main goal of the proposed system allows clients to request help from remote servers over the Network.

A Comparison of Four Classification Algorithms for Facial Expression Recognition

2020-09
Polytechnic Journal (القضية : 1) (الحجم : 10)
Facial expression recognition (FER) has achieved an extreme role in research area since the 1990s. This paper provides a comparison approach for FER based on three feature selection methods which are correlation, gain ration, and information gain for determining the most distinguished features of face images using multi-classification algorithms which are multilayer perceptron, Naïve Bayes, decision tree, and K-nearest neighbor (KNN). These classifiers are used for the mission of expression recognition and for comparing their proportional performance. The main aim of the provided approach is to determine the most effective classifier based on minimum acceptable number of features by analyzing and comparing their performance. The provided approach has been applied on CK+ dataset. The experimental results show that KNN is proven to be better classifier with 91% accuracy using only 30 features.tree, and K-nearest neighbor (KNN). These classifiers are used for the mission of expression recognition and for comparing their proportional performance. The main aim of the provided approach is to determine the most effective classifier based on minimum acceptable number of features by analyzing and comparing their performance. The provided approach has been applied on CK+ dataset. The experimental results show that KNN is proven to be better classifier with 91% accuracy using only 30 features.

An investigation for mobile malware behavioral and detection techniques based on android platform

2020-08
IOSR Journal of Computer Engineering (IOSR-JCE) (القضية : 4) (الحجم : 22)
Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, is being clearer when considering that malware and other types with cyberattacks attack such portable structures. Malware has always been an issue regarding any technological advances in the world of software. Smartphones and other mobile devices are thus to be expected to face the same problems. In this paper, mobile malware detection techniques presented in details. Furthermore, we have stated the recent techniques of mobile malware detection. Adding to that, these closest works to the paper objective are compared with respect to the based-portal, depended-approach, and significant system’s description points.

Cloud computing resources impacts on heavy-load parallel processing approaches

2020-06
IOSR Journal of Computer Engineering (IOSR-JCE) (القضية : 3) (الحجم : 22)
One of the most important subject which many researchers depending on it by applying many algorithms and methods is Cloud Computing. Some of these methods were used to enhance performance, speed, and advantage of task level parallelism and some of these methods used to deal with big data and scheduling. Many others decrease the computation’s quantity in the process of implementation; specially decrease the space of the memory. Parallel data processing is one of the common applications of infrastructure, which is classified as a service in cloud computing. The purpose of this paper is to review parallel processing in cloud. However, the results and methods are inconsistent; therefore, the scheduling concepts give easy method to use the resources and process the data in parallel and decreasing the overall implementation time of processing algorithms. Overall, this review give us and open new doors for using the suitable technique in parallel data processing filed. As a result our work show according to many factors which strategies is better.

Facial Expression Recognition based on Hybrid Feature Extraction Techniques with Different Classifiers

2020-05
TEST Engineering & Management (الحجم : 83)
Facial Expression Recognition (FER) became an important and interest challenging area in the field of computer vision. Due to its major application possibilities, FER is an active topic of research papers since the 1990s, also for the same reason, FER has accomplished a high role in the image processing area. Typically, FER is processed in three main stages including face detection, feature extraction or selection, and classification. This study presents an overview of the current work done for the techniques of the FER field and reviews some of the published researches for the last five years till the date. This paper also gives an overview of the customized made FER algorithms and focused on the method of feature extraction of these FER techniques also the databases that are used. The feature extraction techniques played an important role in making these algorithms more efficient.

Facial expression recognition based on hybrid feature extraction techniques with different classifiers

2020-05
TEST Engineering & Management (الحجم : 83)
Facial Expression Recognition (FER) became an important and interest challenging area in the field of computer vision. Due to its major application possibilities, FER is an active topic of research papers since the 1990s, also for the same reason, FER has accomplished a high role in the image processing area. Typically, FER is processed in three main stages including face detection, feature extraction or selection, and classification. This study presents an overview of the current work done for the techniques of the FER field and reviews some of the published researches for the last five years till the date. This paper also gives an overview of the customized made FER algorithms and focused on the method of feature extraction of these FER techniques also the databases that are used. The feature extraction techniques played an important role in making these algorithms more efficient.

Vaccine Tracker/SMS Reminder System: Design and Implementation

2020-04
International Journal of Multidisciplinary Research and Publications (القضية : 2) (الحجم : 3)
— Every era introduces different challenges to healthcare organizations, and the start of the twenty-first century has been no different. Today there is the unprecedented concentration on the quality of health services. A strong health-care system distributes quality services to all people, where and whenever they need it. Vaccination is one of the most important health-care services for the prevention and control of immuno-preventable diseases and, therefore it is essential to keep the vaccine card up-to-date and accessible to enable its benefits. This paper suggests a solution to remind the child’s parents to make an appointment for the next upcoming vaccination. The proposed system sends reminder short messages service (SMS) and an email message to remind the child's parents based on the vaccine schedule recommended in the Kurdistan region. The proposed system aimed at improving completion of the infant primary immunization by Automatic vaccine updates, reminders for free, and track vaccines for multiple babies from the health-care clinical center.
2019

Selective Multi Keys to Modify RSA Algorithm

2019-06
JZS (الحجم : 21)
The use of the internet and communication technology noticeably contributes to development in all branches of science. The data that is transferred to communication channel are unsecured. Cryptography including security and integrity is a domain that provides policies for having privacy of the data. Protection of the data transferred through the internet is very important since such data when transferred through an unprotected channel may be attacked by a third party. RSA represents one of the public key cryptography methods that generate the modulus using two primes. These two primes represent the weakness of RSA benefited from and used by attackers. This paper proposes a new modified RSA method using selective multi keys encryption and decryption for the same modulus instead of using two keys, one for encryption and the other for decryption. This new method guarantees and increases the security of RSA.
2017

Design and Implementation of Student and Alumni Web Portal

2017-09
Science Journal of University of Zakho (القضية : 3) (الحجم : 5)
The Information and Communication Technology (ICT) has witnessed great development in the recent years. Therefore, the design of Students and Alumni Web Portal (SAWP) involves the analysis of the internal and external environment of the three universities. For this آ آ purpose, SWOT technique has been used to detect the deep effect of environment factors on the strategic plan to discover the strengths, weaknesses, opportunities and threats facing the design of the proposed system. SAWP was designed using (MySQL, HTML, CSS, Java Script, jQuery, PHP, AJAX) techniques to provide robust portal system addressing two subsystems: student and alumni portal system. Testing of the SAWP was administered through two main stages: the first, to identify the student’ s views and their preferences. The second to measure the usability of the system through using System Usability Scale (SUS) method with subscription of 22 potential آ آ system users. The best results of SUS testing are: the rate of overall satisfaction was high nearly 80%. While the implementation outcomes found very compatibility and reasonable in wide extents between available data and system requirements.

Combination of multi classification algorithms for intrusion detection system

2017-09
Int. J. Sci. Eng. Res. (القضية : 1) (الحجم : 6)
Classification is one of the common tasks that are involved in data mining to build models for the prediction of future data. It performs its task by different classifier algorithms. This paper provides an approach based on information gain to determine the most distinguishing subset features of each attack class and combine multi classification algorithms which includes (Decision Tree J48, k nearest Neighbor and Naïve Bays). These classifiers are used for the task of detecting intrusions and comparing their relative performances. The goal of this work is to analyze the performance and accuracy of classification algorithms in order to identify the most efficient algorithm for each attack class, and then build accurate intrusion detection system. The proposed model has been applied on KDD Cup 99 data set using 60% of them for training and 40% for testing. These experimental results show that multiple classifiers work better than a single classifier. Also, multiple classifiers are more accurate and have abilities of distinguishing among the different attacks and normal connections effectively.
2015

Combination of multi classification algorithms for intrusion detection system

2015-01
Int. J. Sci. Eng. Res. (القضية : 1) (الحجم : 6)
Classification is one of the common tasks that are involved in data mining to build models for the prediction of future data. It performs its task by different classifier algorithms. This paper provides an approach based on information gain to determine the most distinguishing subset features of each attack class and combine multi classification algorithms which includes (Decision Tree J48, k nearest Neighbor and Naïve Bays). These classifiers are used for the task of detecting intrusions and comparing their relative performances. The goal of this work is to analyze the performance and accuracy of classification algorithms in order to identify the most efficient algorithm for each attack class, and then build accurate intrusion detection system. The proposed model has been applied on KDD Cup 99 data set using 60% of them for training and 40% for testing. These experimental results show that multiple classifiers work better than a single classifier. Also, multiple classifiers are more accurate and have abilities of distinguishing among the different attacks and normal connections effectively.

الرجوع