Published Journal Articles
2024
KurdSet: A Kurdish Handwritten Characters Recognition Dataset Using Convolutional Neural Network
2024-04
Computers, Materials & Continua (Issue : 1) (Volume : 79)
Handwritten character recognition (HCR) involves identifying characters in images, documents, and various
sources such as forms surveys, questionnaires, and signatures, and transforming them into a machine-readable
format for subsequent processing. Successfully recognizing complex and intricately shaped handwritten characters
remains a significant obstacle. The use of convolutional neural network (CNN) in recent developments has
notably advanced HCR, leveraging the ability to extract discriminative features from extensive sets of raw data.
Because of the absence of pre-existing datasets in the Kurdish language, we created a Kurdish handwritten dataset
called (KurdSet). The dataset consists of Kurdish characters, digits, texts, and symbols. The dataset consists of
1560 participants and contains 45,240 characters. In this study, we chose characters only from our dataset. We
utilized a Kurdish dataset for handwritten character recognition. The study also utilizes various models, including
InceptionV3, Xception, DenseNet121, and a custom CNN model. To show the performance of the KurdSet dataset,
we compared it to Arabic handwritten character recognition dataset (AHCD). We applied the models to both
datasets to show the performance of our dataset. Additionally, the performance of the models is evaluated using
test accuracy, which measures the percentage of correctly classified characters in the evaluation phase. All models
performed well in the training phase, DenseNet121 exhibited the highest accuracy among the models, achieving a
high accuracy of 99.80% on the Kurdish dataset. And Xception model achieved 98.66% using the Arabic dataset.
HANDWRITTEN CHARACTER RECOGNITION IN ASSYRIAN LANGUAGE USING CONVOLUTIONAL NEURAL NETWORK
2024-03
Science Journal of University of Zakho (Issue : 1) (Volume : 12)
Academics and researchers worldwide have paid close attention to biometric handwriting recognition using deep learning as much research has been proposed to enhance biometric recognition in the past and in recent years. Several solutions for character recognition systems in various languages, including Chinese, English, Japanese, Arabic, and Kurdish have been developed. Unfortunately, there has been minimal growth in the Assyrian language. There is still little research on Assyrian handwriting. In this paper, a new Assyrian language dataset was created as part of the procedure by distributing 500 forms consisting of 36 Assyrian characters to people between the ages of 13 and 60 of both genders. The preprocessing operation includes cleaning the noisy data and segmenting each image to 224x224 pixels. This effort resulted in the collection of 18,000 images of these characters to be trained 70% and tested 30% in four CNN models, VGG16, VGG19, MobileNet-V2, and ResNet-50, over 30 epochs to give an accuracy rate of 90.97%, 92.06%, 95.70%, and 94.97%., respectively.
Effects of Different Datasets, Models, Face-parts on Accuracy and Performance of Intelligent Facial Expression Recognition Systems
2024-02
International Journal of Intelligent Systems and Applications in Engineering (Issue : 15) (Volume : 12)
Facial expression recognition is a crucial area of study in the field of computer vision. Research on nonverbal communication has shown that a significant amount of deliberate information is sent via facial expressions. Facial expression recognition is a crucial field in computer vision that deals with the significant impact of nonverbal communication. Expression recognition has lately been extensively used in the medical and advertising sectors. Difficulties in Facial Emotion Recognition. Facial emotion recognition is a technique that examines facial expressions in static photos and videos to uncover information about an individual's emotional state. The intricacy of facial expressions, the versatile use of the technology in any setting, and the incorporation of emerging technologies like artificial intelligence pose substantial privacy hazards. Facial expressions serve as non-verbal cues, offering indications of human emotions. Deciphering emotional expressions has been a focal point of study in psychology for many years. This study will examine several prior studies that have undertaken comprehensive facial analysis, including both total and partial face recognition, to identify expressions and emotions. The datasets and models used in previous studies, as well as the findings gained, show that employing the whole face yields more accuracy compared to using specific face-parts, which result in lower accuracy ratios. However, emotional identification often does not rely only on the whole face, since it is not always feasible to have the full face available. Contemporary research is now prioritising the identification of facial expressions based on certain facial features. Efficient deep learning algorithms, particularly the CNN algorithm, can do this task.
KurdSet Handwritten Digits Recognition Based on Different Convolutional Neural Networks Models.
2024-01
Computers, Materials & Continua (Issue : 1) (Volume : 78)
Recognition of handwritten digits has garnered significant interest among researchers in the domain of recognizing pattern. This interest stems from the recognition's relevance in various real-life applications, including reading financial checks and official documents, which has remained a persistent obstacle. To address this challenge, researchers have developed numerous algorithms focusing on recognizing handwritten digits across different human languages. This paper presents a new Kurdish Handwritten dataset, consisting of Kurdish characters, digits, texts, and symbols. The dataset consists of 1560 participants, encompassing a broad and varied group. It serves as the primary dataset for training and evaluating algorithms in Kurdish digit recognition. We used Kurdish dataset named (KurdSet) and Arabic dataset for handwritten recognition, which holds 70,000 images of Arabic digits that were written by 700 various participants. Additionally, various models are utilized in the study, including ResNet50, DenseNet121, MobileNet, and a custom CNN (convolutional neural network). Additionally, the models' effectiveness was assessed through the examination of test accuracy, which measures the percentage of correctly classified digits in the evaluation phase. ResNet50 also performs exceptionally well that achieved test accuracy 99.67%, indicating its All models exhibit good performance, DenseNet121 and the Custom CNN Model demonstrate the highest test accuracy of 99.73%, highlighting their superior performance. capabilities in capturing relevant features. Despite its accuracy, MobileNet still exhibits good recognition capability with a test accuracy 99.54%.
Cybernet Model: A New Deep Learning Model for Cyber DDoS Attacks Detection and Recognition
2024-01
Computers, Materials & Continua (Issue : 1) (Volume : 78)
Cyberspace is extremely dynamic, with new attacks arising daily. Protecting cybersecurity controls is vital for
network security. Deep Learning (DL) models find widespread use across various fields, with cybersecurity being
one of the most crucial due to their rapid cyberattack detection capabilities on networks and hosts. The capabilities
of DL in feature learning and analyzing extensive data volumes lead to the recognition of network traffic patterns.
This study presents novel lightweight DL models, known as Cybernet models, for the detection and recognition of
various cyber Distributed Denial of Service (DDoS) attacks. These models were constructed to have a reasonable
number of learnable parameters, i.e., less than 225,000, hence the name “lightweight.” This not only helps reduce the
number of computations required but also results in faster training and inference times. Additionally, these models
were designed to extract features in parallel from 1D Convolutional Neural Networks (CNN) and Long ShortTerm Memory (LSTM), which makes them unique compared to earlier existing architectures and results in better
performance measures. To validate their robustness and effectiveness, they were tested on the CIC-DDoS2019
dataset, which is an imbalanced and large dataset that contains different types of DDoS attacks. Experimental
results revealed that both models yielded promising results, with 99.99% for the detection model and 99.76% for the
recognition model in terms of accuracy, precision, recall, and F1 score. Furthermore, they outperformed the existing
state-of-the-art models proposed for the same task. Thus, the proposed models can be used in cyber security
research domains to successfully identify different types of attacks with a high detection and recognition rate.
2023
Cyber security: performance analysis and challenges for cyber attacks detection
2023-11
Indonesian Journal of Electrical Engineering and Computer Science (Issue : 3) (Volume : 31)
Nowadays, with the occurrence of new attacks and raised challenges have
been facing the security of computer systems. Cyber security techniques have
become essential for information technology services to detect and react
against cyber-attacks. The strategy of cyber security enables visibility of
various types of attacks and vulnerabilities throughout computer networks,
whilst also provides detecting cyber-attacks and effective ways of identifying
and preventing them. This study mainly focuses on the performance analysis
and challenges faced by cyber security using the latest techniques. It also
provides a review of the attack detection process including the robust
effectiveness of intelligent techniques. Finally, summarize and discuss some
methods to increase attack detection performance utilizing deep learning (DL)
architectures.
A Comprehensive Overview of Handwritten Recognition Techniques: A Survey
2023-07
Journal of Computer Science (Issue : 05) (Volume : 19)
Deep learning and deep neural networks, particularly Convolutional Neural Networks (CNNs), are rapidly growing areas of machine learning and are currently the primary tools used for image analysis and classification applications. Handwriting recognition involves using computer algorithms and software to interpret and recognize handwritten text and drawings and has various applications such as automated handwriting analysis, document digitization, and handwriting-based user interfaces. Many deep learning models have been applied in the field of handwriting recognition and various datasets have been used to evaluate new computer vision techniques. This article provides an overview of the current state-of-the-art approaches and contributions to handwriting recognition using different datasets. Furthermore, the paper explains the most commonly used algorithms for recognizing handwritten characters, words, and numbers. Compares them based on their accuracy. This study covered different aspects and methods of machine learning and Deep Learning (DL) for handwritten recognition that showed different achievements for each.
Drug Storage System based on Fuzzy Logic and the Internet of Things.
2023-07
Science Journal of University of Zakho (Issue : 3) (Volume : 11)
Health-related issues are a top priority for anyone in the world, and if there is any issue related to health, then solutions should be found as soon as possible. Medicine is one of the most important causes of recovery, so storing medicines of the highest possible quality is necessary. Storing medicines is very important for the hospital because they are used for hormones, viruses, and ointments, which are of great value to the hospital's sustainability and must always be preserved. This study designed and implemented a system to continuously control and monitor sensitive atmospheric information for drug storage, such as temperature, humidity, and light exposure. The system starts by reading the environment sensors around the drug store by the microcontroller. Then the microcontroller passes the data to the fuzzy logic. Mamdani-type fuzzy control is implemented to control and monitor devices that are used on fuzzy rules. The system has the ability to send an alarm when any of the temperature and humidity-related parameters are higher or lower than normal. The data collected using this system is sent via two methods: the first is the website platform, and the second is GSM notification. Drug storage is designed and implemented using a microcontroller and IoT sensors. During the system analysis phase, the SWOT method was utilized to obtain user perspectives and preferences, which were then incorporated into the system output specifications for the development phase. This approach helped to identify the necessary system requirements. During the implementation phase of the system and to measure the capabilities of the system, the technique of measuring the system usability scale was used, with the contribution of 22 users of the system, and the percentage recorded as general satisfaction with the system was 91%. The new system improves the overall quality of drug storage, reduces the risk of drug deterioration to patients' health, and reduces the incidence of adverse events associated with drug mismanagement.
Web-Based Agricultural Management Products for Marketing System: Survey
2023-04
Academic Journal of Nawroz University (AJNU) (Issue : 02) (Volume : 12)
The development of information systems motivated scientists to use their knowledge to improve new tactics that can provide competitive advantages in a highly complex environment, primarily in the management of agricultural products marketing systems. Farmers often blame marketing issues for their struggles. Poor prices, a lack of transportation, and substantial post-harvest losses are all issues that they can recognize, but they are typically ill-equipped to solve. Modern technology, particularly Internet and mobile connectivity, makes it easier for people to do their work across a wide range of activities,including economics, commerce, marketing, and agriculture. Agricultural Information Management Systems (AIMS) are becoming more popular as a useful sector as agriculture expands and becomes one of the world's most lucrative enterprises. In recent years, people have become increasingly dependent on this technology. Systems have evolved from passively absorbing information to actively incorporating users as an important part of the system. The goal of this research is to clarify and exhibit that different kind of systems employed by various agricultural-related authorities had a good probable influence on their operations by making duties simpler for their personnel. Specifically, the study focuses on displaying this information. In addition, the research analyzes the primary distinctions between these studies by contrasting many of them, with the goal of gaining an understanding of the foundational advantages that may be used by new researchers that are interested in developing new AIMS, And in order to fully comprehend websites, researchers are combining quantitative and qualitative approaches. Numerous analyses of agricultural product websites have been conducted, using a wide range of approaches. Study 26 investigated whether farmers' and retailers' use of web-based technology facilitated the display and sale of goods.
Web-Based Agricultural Management Products for Marketing System: Survey
2023-04
Academic Journal of Nawroz University (Issue : 2) (Volume : 12)
The development of information systems motivated scientists to use their knowledge to improve new tactics that can provide competitive advantages in a highly complex environment, primarily in the management of agricultural products marketing systems. Farmers often blame marketing issues for their struggles. Poor prices, a lack of transportation, and substantial post-harvest losses are all issues that they can recognize, but they are typically ill-equipped to solve. Modern technology, particularly Internet and mobile connectivity, makes it easier for people to do their work across a wide range of activities, including economics, commerce, marketing, and agriculture. Agricultural Information Management Systems (AIMS) are becoming more popular as a useful sector as agriculture expands and becomes one of the world's most lucrative enterprises. In recent years, people have become increasingly dependent on this technology. Systems have evolved from passively absorbing information to actively incorporating users as an important part of the system. The goal of this research to find out whether various agricultural implementations of various systems have a good effect on their operations by facilitating chores for farmers and dealers, and merchants easier. Study 26 investigated whether farmers' and retailers' use of web-based technology facilitated the display and sale of goods.
Design and Implementation of a Responsive Web-based System for Controlling the Financial Budget of Universities
2023-04
Journal of Computer Science (Issue : 5) (Volume : 19)
The management of the financial budget of universities is an extremely complex task due to having numerous different documents and calculation processes. In many developing regions and countries including the Kurdistan Region of Iraq, budget execution and accounting processes are manual. This had deleterious effects on the functioning of their expenditure and income management. This research represents the design and implementation of a responsive web-based system for controlling the financial budget of universities. This system can improve the recording and processing of financial transactions. Moreover, it traces all the stages of the transaction processing from budget releases, does auditing, and accounting of expenditures, incomes, deposits, and funds. Furthermore, it provides financial information on present and past performance. The system is a responsive web-based system, which adjusts the layout of the pages based on the screen size and orientation of the user's device. The system was implemented by using programming languages such as HTML, PHP, JavaScript, jQuery, AJAX, and MySQL. Finally, the provided system needed to be investigated from the performance point of view. Therefore, a questionnaire was used to determine the system’s usability by using the System Usability Scale (SUS) tool. The results revealed that a score of 86.250% of satisfaction has been achieved.
2022
Fuzzy logic system for drug storage based on the internet of things: a survey
2022-12
Indonesian Journal of Electrical Engineering and Computer Science (Issue : 3) (Volume : 29)
The rapid development of internet of things (IoT) technology over the course of recent history has made it possible to connect a large number of smart things and sensors, as well as to establish an environment in which data can be seamlessly exchanged between them. This has led to an increase in the demand for data analysis and storage platforms such as cloud computing and fog computing. One of the application areas for the internet of things that has garnered a lot of interest from the business world, academic institutions, and the government is healthcare. The IoT and fuzzy logic are being used in the medical business to improve patient safety, the overall quality of care, and the overall efficiency of medical operations. The most important healthcare studies that are pertinent to pharmacies have been used as the basis for this research. The purpose of this research is to investigate recent advancements in medical modules, remotes, and detector patterns, as well as current innovations in IoT and fuzzy logic-based health care, and current policies from around the world, with the intention of determining how well they support the long-term growth of IoT and fuzzy logic in healthcare.
Analyses the Performance of Data Warehouse Architecture Types
2022-06
JOURNAL OF SOFT COMPUTING AND DATA MINING (Issue : 1) (Volume : 3)
The concept of storing historical data for retrieving them when needed has been conceived, and the idea was primitive to build repositories for historical data to store these data, despite the use of a specific technique for recovering these data from various storage modes. The data warehouse is the most reliable and widely used technology for scheduling, forecasting, and managing corporations. Also, it is concerned with the data storage facility that extensive collection of data. Data warehouses are called ancient modern techniques; since the early days of relational databases, the critical component of decision support, increasing focus for the database industry. Many commercial products and services are now available, and almost all of the primary database management system vendors provide them. When opposed to conventional online transaction processing applications, decision support puts slightly different demands on database technology. This paper analyzes the performance of the data warehouse architectures by studying and comparing many research works in this field. The study involves extracting, transforming, and loading the data from different recourses and the important characteristic of the architecture types. Furthermore, the tools and application service techniques used to build data warehouse architecture.
2021
A state of art survey for intelligent energy monitoring systems
2021-04
Asian Journal of Research in Computer Science (Issue : 1) (Volume : 8)
In this study, the significance and necessities of surveillance systems have been investigated in several areas-both in the use of neural networks, street lighting systems, factories, and laboratories-for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they can affect any sector and industry reach an essential point from here. Here we reach an important point. An algorithm and an extraordinary approach have been used in every field to develop an intelligent programmer. Something has been mentioned here: the ability to access these intelligent programs in all areas of life. We concentrate on a variety of fields of use and design of monitoring systems in this review article.
2020
Client/Server Remote Control Administration System: Design and Implementation
2020-11
Int. J. Multidiscip. Res. Publ (Issue : 2) (Volume : 3)
Networks of computers are everywhere, and it implemented in all sectors, including an IT, industrial, managerial sector, and need to be accessed remotely. Remote administration offers access to a remote device. As more departments of Information Technology centralize and reorganize to keep costs down, many remote sites are left with no IT support on-site. Remote computer administration is increasingly common due to the major cost advantages; many activities can be completed, and not needs to be personally accessed by the administrator. In this paper, the remotecontrol administration system has designed and implemented based on client/server architecture. The main goal of the proposed system allows clients to request help from remote servers over the Network.
A Comparison of Four Classification Algorithms for Facial Expression Recognition
2020-09
Polytechnic Journal (Issue : 1) (Volume : 10)
Facial expression recognition (FER) has achieved an extreme role in research area since the 1990s. This paper provides a comparison approach for FER based on three feature selection methods which are correlation, gain ration, and information gain for determining the most distinguished features of face images using multi-classification algorithms which are multilayer perceptron, Naïve Bayes, decision tree, and K-nearest neighbor (KNN). These classifiers are used for the mission of expression recognition and for comparing their proportional performance. The main aim of the provided approach is to determine the most effective classifier based on minimum acceptable number of features by analyzing and comparing their performance. The provided approach has been applied on CK+ dataset. The experimental results show that KNN is proven to be better classifier with 91% accuracy using only 30 features.tree, and K-nearest neighbor (KNN). These classifiers are used for the mission of expression recognition and for comparing their proportional performance. The main aim of the provided approach is to determine the most effective classifier based on minimum acceptable number of features by analyzing and comparing their performance. The provided approach has been applied on CK+ dataset. The experimental results show that KNN is proven to be better classifier with 91% accuracy using only 30 features.
An investigation for mobile malware behavioral and detection techniques based on android platform
2020-08
IOSR Journal of Computer Engineering (IOSR-JCE) (Issue : 4) (Volume : 22)
Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, is being clearer when considering that malware and other types with cyberattacks attack such portable structures. Malware has always been an issue regarding any technological advances in the world of software. Smartphones and other mobile devices are thus to be expected to face the same problems. In this paper, mobile malware detection techniques presented in details. Furthermore, we have stated the recent techniques of mobile malware detection. Adding to that, these closest works to the paper objective are compared with respect to the based-portal, depended-approach, and significant system’s description points.
Cloud computing resources impacts on heavy-load parallel processing approaches
2020-06
IOSR Journal of Computer Engineering (IOSR-JCE) (Issue : 3) (Volume : 22)
One of the most important subject which many researchers depending on it by applying many algorithms and methods is Cloud Computing. Some of these methods were used to enhance performance, speed, and advantage of task level parallelism and some of these methods used to deal with big data and scheduling. Many others decrease the computation’s quantity in the process of implementation; specially decrease the space of the memory. Parallel data processing is one of the common applications of infrastructure, which is classified as a service in cloud computing. The purpose of this paper is to review parallel processing in cloud. However, the results and methods are inconsistent; therefore, the scheduling concepts give easy method to use the resources and process the data in parallel and decreasing the overall implementation time of processing algorithms. Overall, this review give us and open new doors for using the suitable technique in parallel data processing filed. As a result our work show according to many factors which strategies is better.
Facial Expression Recognition based on Hybrid Feature Extraction Techniques with Different Classifiers
2020-05
TEST Engineering & Management (Volume : 83)
Facial Expression Recognition (FER) became an important and interest challenging area in the field of computer vision. Due to its major application possibilities, FER is an active topic of research papers since the 1990s, also for the same reason, FER has accomplished a high role in the image processing area. Typically, FER is processed in three main stages including face detection, feature extraction or selection, and classification. This study presents an overview of the current work done for the techniques of the FER field and reviews some of the published researches for the last five years till the date. This paper also gives an overview of the customized made FER algorithms and focused on the method of feature extraction of these FER techniques also the databases that are used. The feature extraction techniques played an important role in making these algorithms more efficient.
Classification techniques’ performance evaluation for facial expression recognition
2020-05
TEST Engineering & Management (Volume : 83)
Facial exprestion recognition as a recently developed method in computer vision is founded upon the idea of analazing the facial changes in which are witnessed due to emotional impacts on an individual. This paper provides a performance evaluation of a set of supervised classifiers used for facial expression recognition based on minimum features selected by chi-square. These features are the most iconic and influential ones that have tangible value for result dermination. The highest ranked six features are applied on six classifiers including multi-layer preceptron, support vector machine, decision tree, random forest, radial baised function, and K-Nearest neioughbor to figure out the most accurate one when the minum number of features are utilized. This is done via analyzing and appraising the classifiers’ performance. CK+ is used as the research’s dataset. random forest with the total accuracy ratio of 94.23% is illustrated as the most accurate classifier amongst the rest.
A Tree Method for Managing Documents in Mongodb
2020-04
International Journal of Multidisciplinary Research and Publications (Issue : 2) (Volume : 3)
Relational databases have a wide range of applications and use in many
areas over the past decades. After the emergence of social networks, the
increase in the number of users of these networks, the evolution of data
types and relationships between records have formed the main reasons
behind the need to represent and store data in a dynamic way. One of the
best ways to handle big data is document-oriented databases. This
approach is characterized by the absence of a design to represent entities,
as each entity in the entity set may have different private information from
other entities in the same set. For the users of the data, data is displayed
and manipulated by an easy graphical user interface which with its
functionality (such as adding, deleting, updating a record) are designed
during and after the design of the database. The design of the end-user
interface depends on the customer's requirements as well as the design of
the database. In the case of document-oriented databases, there is no static
database design. Each entity has its own embedded design. It is possible at
any time to add new fields or change the data type for some fields, in
addition to the possibility of deleting some fields from some documents.
Therefore, the user interface designing process for document-oriented
databases is difficult and requires deep intuition in addition to a continuous
modification of the design. In this research, it is suggested to use the tree
to represent and manipulate the information of each entity separate from
that of other entities in the same collection. This method represents each
field name and field value as a node. In addition to the fact that the
embedded documents are represented in the form of an embedded tree, this
method facilitates the representation and handling of any structure of the
document. A document management tool has also been built on the
proposed managing MongoDB documents.
2019
Selective Multi Keys to Modify RSA Algorithm
2019-06
JZS (Volume : 21)
The use of the internet and communication technology noticeably contributes to development in all branches of science. The data that is transferred to communication channel are unsecured. Cryptography including security and integrity is a domain that provides policies for having privacy of the data. Protection of the data transferred through the internet is very important since such data when transferred through an unprotected channel may be attacked by a third party. RSA represents one of the public key cryptography methods that generate the modulus using two primes. These two primes represent the weakness of RSA benefited from and used by attackers. This paper proposes a new modified RSA method using selective multi keys encryption and decryption for the same modulus instead of using two keys, one for encryption and the other for decryption. This new method guarantees and increases the security of RSA.
2017
Design and Implementation of Student and Alumni Web Portal
2017-09
Science Journal of University of Zakho (Issue : 3) (Volume : 5)
The Information and Communication Technology (ICT) has witnessed great development in the recent years. Therefore, the design of Students and Alumni Web Portal (SAWP) involves the analysis of the internal and external environment of the three universities. For this آ آ purpose, SWOT technique has been used to detect the deep effect of environment factors on the strategic plan to discover the strengths, weaknesses, opportunities and threats facing the design of the proposed system. SAWP was designed using (MySQL, HTML, CSS, Java Script, jQuery, PHP, AJAX) techniques to provide robust portal system addressing two subsystems: student and alumni portal system. Testing of the SAWP was administered through two main stages: the first, to identify the student’ s views and their preferences. The second to measure the usability of the system through using System Usability Scale (SUS) method with subscription of 22 potential آ آ system users. The best results of SUS testing are: the rate of overall satisfaction was high nearly 80%. While the implementation outcomes found very compatibility and reasonable in wide extents between available data and system requirements.
Designing and Implementing of An Online Library Managment System
2017-09
Int. J. Sci. Eng. Res. (Issue : 1) (Volume : 6)
One of the most important fields in education is library. The library is a fast-growing system. The traditional methods of maintaining it are no longer dynamic and efficient. For expeditious retrieval and dissemination of information and better service for the clientele, an application of modern techniques has become absolutely indispensable. A properly computerized library will help its users with quick and prompt services. Therefore, this Paper produces an efficient Online Library Management System (OLMS) for university campus. The main purpose of this Paper is to design and implement the (OLMS). The OLMS consists of two modules: External Pages Module and Internal Pages Module. The first module is with limited operation such as (viewing, searching and registration request). The second module for the personal account can do the operations like (storing, searching, viewing, borrowing, downloading and etc.). The system controllers are two types. The first one is the (Co_Admin) which can manage library operation. The second one is the administrator which can create and manage university libraries and also can create (Co_Admin) for each faculty library. The system can generate different types of reports and can also calculate the (fines) on the users, also any request or response will be done by E-Mail and short message service (SMS). The OLMS was designed and implemented by using (MySQL, HTML, CSS, PHP, JavaScript, JQuery, Ajax and Bootstrap) techniques. The system was tested in two phases: the first phase identifies the views and preferences of users with the specification of the system outputs, depending on the requirements …
2015
Combination of multi classification algorithms for intrusion detection system
2015-01
Int. J. Sci. Eng. Res. (Issue : 1) (Volume : 6)
Classification is one of the common tasks that are involved in data mining to build models for the prediction of future data. It performs its task by different classifier algorithms. This paper provides an approach based on information gain to determine the most distinguishing subset features of each attack class and combine multi classification algorithms which includes (Decision Tree J48, k nearest Neighbor and Naïve Bays). These classifiers are used for the task of detecting intrusions and comparing their relative performances. The goal of this work is to analyze the performance and accuracy of classification algorithms in order to identify the most efficient algorithm for each attack class, and then build accurate intrusion detection system. The proposed model has been applied on KDD Cup 99 data set using 60% of them for training and 40% for testing. These experimental results show that multiple classifiers work better than a single classifier. Also, multiple classifiers are more accurate and have abilities of distinguishing among the different attacks and normal connections effectively.
Back