| English | Arabic | Home | Login |

Published Journal Articles

2023

A Comprehensive Overview of Handwritten Recognition Techniques: A Survey

2023-07
Journal of Computer Science (Issue : 05) (Volume : 19)
Deep learning and deep neural networks, particularly Convolutional Neural Networks (CNNs), are rapidly growing areas of machine learning and are currently the primary tools used for image analysis and classification applications. Handwriting recognition involves using computer algorithms and software to interpret and recognize handwritten text and drawings and has various applications such as automated handwriting analysis, document digitization, and handwriting-based user interfaces. Many deep learning models have been applied in the field of handwriting recognition and various datasets have been used to evaluate new computer vision techniques. This article provides an overview of the current state-of-the-art approaches and contributions to handwriting recognition using different datasets. Furthermore, the paper explains the most commonly used algorithms for recognizing handwritten characters, words, and numbers. Compares them based on their accuracy. This study covered different aspects and methods of machine learning and Deep Learning (DL) for handwritten recognition that showed different achievements for each.

Web-Based Agricultural Management Products for Marketing System: Survey

2023-04
Academic Journal of Nawroz University (AJNU) (Issue : 02) (Volume : 12)
The development of information systems motivated scientists to use their knowledge to improve new tactics that can provide competitive advantages in a highly complex environment, primarily in the management of agricultural products marketing systems. Farmers often blame marketing issues for their struggles. Poor prices, a lack of transportation, and substantial post-harvest losses are all issues that they can recognize, but they are typically ill-equipped to solve. Modern technology, particularly Internet and mobile connectivity, makes it easier for people to do their work across a wide range of activities,including economics, commerce, marketing, and agriculture. Agricultural Information Management Systems (AIMS) are becoming more popular as a useful sector as agriculture expands and becomes one of the world's most lucrative enterprises. In recent years, people have become increasingly dependent on this technology. Systems have evolved from passively absorbing information to actively incorporating users as an important part of the system. The goal of this research is to clarify and exhibit that different kind of systems employed by various agricultural-related authorities had a good probable influence on their operations by making duties simpler for their personnel. Specifically, the study focuses on displaying this information. In addition, the research analyzes the primary distinctions between these studies by contrasting many of them, with the goal of gaining an understanding of the foundational advantages that may be used by new researchers that are interested in developing new AIMS, And in order to fully comprehend websites, researchers are combining quantitative and qualitative approaches. Numerous analyses of agricultural product websites have been conducted, using a wide range of approaches. Study 26 investigated whether farmers' and retailers' use of web-based technology facilitated the display and sale of goods.
2022

Fuzzy logic system for drug storage based on the internet of things: a survey

2022-12
Indonesian Journal of Electrical Engineering and Computer Science (Issue : 3) (Volume : 29)
The rapid development of internet of things (IoT) technology over the course of recent history has made it possible to connect a large number of smart things and sensors, as well as to establish an environment in which data can be seamlessly exchanged between them. This has led to an increase in the demand for data analysis and storage platforms such as cloud computing and fog computing. One of the application areas for the internet of things that has garnered a lot of interest from the business world, academic institutions, and the government is healthcare. The IoT and fuzzy logic are being used in the medical business to improve patient safety, the overall quality of care, and the overall efficiency of medical operations. The most important healthcare studies that are pertinent to pharmacies have been used as the basis for this research. The purpose of this research is to investigate recent advancements in medical modules, remotes, and detector patterns, as well as current innovations in IoT and fuzzy logic-based health care, and current policies from around the world, with the intention of determining how well they support the long-term growth of IoT and fuzzy logic in healthcare.

Analyses the Performance of Data Warehouse Architecture Types

2022-06
JOURNAL OF SOFT COMPUTING AND DATA MINING (Issue : 1) (Volume : 3)
The concept of storing historical data for retrieving them when needed has been conceived, and the idea was primitive to build repositories for historical data to store these data, despite the use of a specific technique for recovering these data from various storage modes. The data warehouse is the most reliable and widely used technology for scheduling, forecasting, and managing corporations. Also, it is concerned with the data storage facility that extensive collection of data. Data warehouses are called ancient modern techniques; since the early days of relational databases, the critical component of decision support, increasing focus for the database industry. Many commercial products and services are now available, and almost all of the primary database management system vendors provide them. When opposed to conventional online transaction processing applications, decision support puts slightly different demands on database technology. This paper analyzes the performance of the data warehouse architectures by studying and comparing many research works in this field. The study involves extracting, transforming, and loading the data from different recourses and the important characteristic of the architecture types. Furthermore, the tools and application service techniques used to build data warehouse architecture.
2021

A state of art survey for intelligent energy monitoring systems

2021-04
Asian Journal of Research in Computer Science (Issue : 1) (Volume : 8)
In this study, the significance and necessities of surveillance systems have been investigated in several areas-both in the use of neural networks, street lighting systems, factories, and laboratories-for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they can affect any sector and industry reach an essential point from here. Here we reach an important point. An algorithm and an extraordinary approach have been used in every field to develop an intelligent programmer. Something has been mentioned here: the ability to access these intelligent programs in all areas of life. We concentrate on a variety of fields of use and design of monitoring systems in this review article.
2020

Client/Server Remote Control Administration System: Design and Implementation

2020-11
Int. J. Multidiscip. Res. Publ (Issue : 2) (Volume : 3)
Networks of computers are everywhere, and it implemented in all sectors, including an IT, industrial, managerial sector, and need to be accessed remotely. Remote administration offers access to a remote device. As more departments of Information Technology centralize and reorganize to keep costs down, many remote sites are left with no IT support on-site. Remote computer administration is increasingly common due to the major cost advantages; many activities can be completed, and not needs to be personally accessed by the administrator. In this paper, the remotecontrol administration system has designed and implemented based on client/server architecture. The main goal of the proposed system allows clients to request help from remote servers over the Network.

A Comparison of Four Classification Algorithms for Facial Expression Recognition

2020-09
Polytechnic Journal (Issue : 1) (Volume : 10)
Facial expression recognition (FER) has achieved an extreme role in research area since the 1990s. This paper provides a comparison approach for FER based on three feature selection methods which are correlation, gain ration, and information gain for determining the most distinguished features of face images using multi-classification algorithms which are multilayer perceptron, Naïve Bayes, decision tree, and K-nearest neighbor (KNN). These classifiers are used for the mission of expression recognition and for comparing their proportional performance. The main aim of the provided approach is to determine the most effective classifier based on minimum acceptable number of features by analyzing and comparing their performance. The provided approach has been applied on CK+ dataset. The experimental results show that KNN is proven to be better classifier with 91% accuracy using only 30 features.tree, and K-nearest neighbor (KNN). These classifiers are used for the mission of expression recognition and for comparing their proportional performance. The main aim of the provided approach is to determine the most effective classifier based on minimum acceptable number of features by analyzing and comparing their performance. The provided approach has been applied on CK+ dataset. The experimental results show that KNN is proven to be better classifier with 91% accuracy using only 30 features.

An investigation for mobile malware behavioral and detection techniques based on android platform

2020-08
IOSR Journal of Computer Engineering (IOSR-JCE) (Issue : 4) (Volume : 22)
Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, is being clearer when considering that malware and other types with cyberattacks attack such portable structures. Malware has always been an issue regarding any technological advances in the world of software. Smartphones and other mobile devices are thus to be expected to face the same problems. In this paper, mobile malware detection techniques presented in details. Furthermore, we have stated the recent techniques of mobile malware detection. Adding to that, these closest works to the paper objective are compared with respect to the based-portal, depended-approach, and significant system’s description points.

Cloud computing resources impacts on heavy-load parallel processing approaches

2020-06
IOSR Journal of Computer Engineering (IOSR-JCE) (Issue : 3) (Volume : 22)
One of the most important subject which many researchers depending on it by applying many algorithms and methods is Cloud Computing. Some of these methods were used to enhance performance, speed, and advantage of task level parallelism and some of these methods used to deal with big data and scheduling. Many others decrease the computation’s quantity in the process of implementation; specially decrease the space of the memory. Parallel data processing is one of the common applications of infrastructure, which is classified as a service in cloud computing. The purpose of this paper is to review parallel processing in cloud. However, the results and methods are inconsistent; therefore, the scheduling concepts give easy method to use the resources and process the data in parallel and decreasing the overall implementation time of processing algorithms. Overall, this review give us and open new doors for using the suitable technique in parallel data processing filed. As a result our work show according to many factors which strategies is better.

Facial Expression Recognition based on Hybrid Feature Extraction Techniques with Different Classifiers

2020-05
TEST Engineering & Management (Volume : 83)
Facial Expression Recognition (FER) became an important and interest challenging area in the field of computer vision. Due to its major application possibilities, FER is an active topic of research papers since the 1990s, also for the same reason, FER has accomplished a high role in the image processing area. Typically, FER is processed in three main stages including face detection, feature extraction or selection, and classification. This study presents an overview of the current work done for the techniques of the FER field and reviews some of the published researches for the last five years till the date. This paper also gives an overview of the customized made FER algorithms and focused on the method of feature extraction of these FER techniques also the databases that are used. The feature extraction techniques played an important role in making these algorithms more efficient.

Classification techniques’ performance evaluation for facial expression recognition

2020-05
TEST Engineering & Management (Volume : 83)
Facial exprestion recognition as a recently developed method in computer vision is founded upon the idea of analazing the facial changes in which are witnessed due to emotional impacts on an individual. This paper provides a performance evaluation of a set of supervised classifiers used for facial expression recognition based on minimum features selected by chi-square. These features are the most iconic and influential ones that have tangible value for result dermination. The highest ranked six features are applied on six classifiers including multi-layer preceptron, support vector machine, decision tree, random forest, radial baised function, and K-Nearest neioughbor to figure out the most accurate one when the minum number of features are utilized. This is done via analyzing and appraising the classifiers’ performance. CK+ is used as the research’s dataset. random forest with the total accuracy ratio of 94.23% is illustrated as the most accurate classifier amongst the rest.

A Tree Method for Managing Documents in Mongodb

2020-04
International Journal of Multidisciplinary Research and Publications (Issue : 2) (Volume : 3)
Relational databases have a wide range of applications and use in many areas over the past decades. After the emergence of social networks, the increase in the number of users of these networks, the evolution of data types and relationships between records have formed the main reasons behind the need to represent and store data in a dynamic way. One of the best ways to handle big data is document-oriented databases. This approach is characterized by the absence of a design to represent entities, as each entity in the entity set may have different private information from other entities in the same set. For the users of the data, data is displayed and manipulated by an easy graphical user interface which with its functionality (such as adding, deleting, updating a record) are designed during and after the design of the database. The design of the end-user interface depends on the customer's requirements as well as the design of the database. In the case of document-oriented databases, there is no static database design. Each entity has its own embedded design. It is possible at any time to add new fields or change the data type for some fields, in addition to the possibility of deleting some fields from some documents. Therefore, the user interface designing process for document-oriented databases is difficult and requires deep intuition in addition to a continuous modification of the design. In this research, it is suggested to use the tree to represent and manipulate the information of each entity separate from that of other entities in the same collection. This method represents each field name and field value as a node. In addition to the fact that the embedded documents are represented in the form of an embedded tree, this method facilitates the representation and handling of any structure of the document. A document management tool has also been built on the proposed managing MongoDB documents.
2019

Selective Multi Keys to Modify RSA Algorithm

2019-06
JZS (Volume : 21)
The use of the internet and communication technology noticeably contributes to development in all branches of science. The data that is transferred to communication channel are unsecured. Cryptography including security and integrity is a domain that provides policies for having privacy of the data. Protection of the data transferred through the internet is very important since such data when transferred through an unprotected channel may be attacked by a third party. RSA represents one of the public key cryptography methods that generate the modulus using two primes. These two primes represent the weakness of RSA benefited from and used by attackers. This paper proposes a new modified RSA method using selective multi keys encryption and decryption for the same modulus instead of using two keys, one for encryption and the other for decryption. This new method guarantees and increases the security of RSA.
2017

Design and Implementation of Student and Alumni Web Portal

2017-09
Science Journal of University of Zakho (Issue : 3) (Volume : 5)
The Information and Communication Technology (ICT) has witnessed great development in the recent years. Therefore, the design of Students and Alumni Web Portal (SAWP) involves the analysis of the internal and external environment of the three universities. For this آ آ purpose, SWOT technique has been used to detect the deep effect of environment factors on the strategic plan to discover the strengths, weaknesses, opportunities and threats facing the design of the proposed system. SAWP was designed using (MySQL, HTML, CSS, Java Script, jQuery, PHP, AJAX) techniques to provide robust portal system addressing two subsystems: student and alumni portal system. Testing of the SAWP was administered through two main stages: the first, to identify the student’ s views and their preferences. The second to measure the usability of the system through using System Usability Scale (SUS) method with subscription of 22 potential آ آ system users. The best results of SUS testing are: the rate of overall satisfaction was high nearly 80%. While the implementation outcomes found very compatibility and reasonable in wide extents between available data and system requirements.

Designing and Implementing of An Online Library Managment System

2017-09
Int. J. Sci. Eng. Res. (Issue : 1) (Volume : 6)
One of the most important fields in education is library. The library is a fast-growing system. The traditional methods of maintaining it are no longer dynamic and efficient. For expeditious retrieval and dissemination of information and better service for the clientele, an application of modern techniques has become absolutely indispensable. A properly computerized library will help its users with quick and prompt services. Therefore, this Paper produces an efficient Online Library Management System (OLMS) for university campus. The main purpose of this Paper is to design and implement the (OLMS). The OLMS consists of two modules: External Pages Module and Internal Pages Module. The first module is with limited operation such as (viewing, searching and registration request). The second module for the personal account can do the operations like (storing, searching, viewing, borrowing, downloading and etc.). The system controllers are two types. The first one is the (Co_Admin) which can manage library operation. The second one is the administrator which can create and manage university libraries and also can create (Co_Admin) for each faculty library. The system can generate different types of reports and can also calculate the (fines) on the users, also any request or response will be done by E-Mail and short message service (SMS). The OLMS was designed and implemented by using (MySQL, HTML, CSS, PHP, JavaScript, JQuery, Ajax and Bootstrap) techniques. The system was tested in two phases: the first phase identifies the views and preferences of users with the specification of the system outputs, depending on the requirements …
2015

Combination of multi classification algorithms for intrusion detection system

2015-01
Int. J. Sci. Eng. Res. (Issue : 1) (Volume : 6)
Classification is one of the common tasks that are involved in data mining to build models for the prediction of future data. It performs its task by different classifier algorithms. This paper provides an approach based on information gain to determine the most distinguishing subset features of each attack class and combine multi classification algorithms which includes (Decision Tree J48, k nearest Neighbor and Naïve Bays). These classifiers are used for the task of detecting intrusions and comparing their relative performances. The goal of this work is to analyze the performance and accuracy of classification algorithms in order to identify the most efficient algorithm for each attack class, and then build accurate intrusion detection system. The proposed model has been applied on KDD Cup 99 data set using 60% of them for training and 40% for testing. These experimental results show that multiple classifiers work better than a single classifier. Also, multiple classifiers are more accurate and have abilities of distinguishing among the different attacks and normal connections effectively.

Back