Iraqi Journal for Computer Science and Mathematics
Latest Publications


TOTAL DOCUMENTS

28
(FIVE YEARS 28)

H-INDEX

0
(FIVE YEARS 0)

Published By College Of Education - Aliraqia University

2788-7421

Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.


Author(s):  
Fawziya M. Rammo ◽  
Mohammed N. Al-Hamdani

Many languages identification (LID) systems rely on language models that use machine learning (ML) approaches, LID systems utilize rather long recording periods to achieve satisfactory accuracy. This study aims to extract enough information from short recording intervals in order to successfully classify the spoken languages under test. The classification process is based on frames of (2-18) seconds where most of the previous LID systems were based on much longer time frames (from 3 seconds to 2 minutes). This research defined and implemented many low-level features using MFCC (Mel-frequency cepstral coefficients), containing speech files in five languages (English. French, German, Italian, Spanish), from voxforge.org an open-source corpus that consists of user-submitted audio clips in various languages, is the source of data used in this paper. A CNN (convolutional Neural Networks) algorithm applied in this paper for classification and the result was perfect, binary language classification had an accuracy of 100%, and five languages classification with six languages had an accuracy of 99.8%.


Author(s):  
K. Kalaiarasi ◽  
MARY HENRIETTA H ◽  
M. Sumathi ◽  
A. Stanley Raj

The technique of limiting expenditure plays a critical part in an organization's ability to govern the smooth operation of its management system. The economic order quantity (EOQ) is calculated by solving a nonlinear problem, and the best solution is investigated in a fuzzy and intuitionistic fuzzy environment. The overall cost is made up of several factors, such as demand, holding, and ordering costs. The demand and stock-out characteristics were both fuzzified using fuzzy and intuitionistic fuzzy numbers. The numerical analysis shows the comparison between the two fuzzy numbers through sensitivity analysis.


Author(s):  
Mezher M. Abed ◽  
Ufuk Öztürk ◽  
Hisham M. Khudhur

The nonlinear conjugate gradient method is an effective technique for solving large-scale minimizations problems, and has a wide range of applications in various fields, such as mathematics, chemistry, physics, engineering and medicine. This study presents a novel spectral conjugate gradient algorithm (non-linear conjugate gradient algorithm), which is derived based on the Hisham–Khalil (KH) and Newton algorithms. Based on pure conjugacy condition The importance of this research lies in finding an appropriate method to solve all types of linear and non-linear fuzzy equations because the Buckley and Qu method is ineffective in solving fuzzy equations. Moreover, the conjugate gradient method does not need a Hessian matrix (second partial derivatives of functions) in the solution. The descent property of the proposed method is shown provided that the step size at meets the strong Wolfe conditions. In numerous circumstances, numerical results demonstrate that the proposed technique is more efficient than the Fletcher–Reeves and KH algorithms in solving fuzzy nonlinear equations.


Author(s):  
Saadaldeen Rashid Ahmed ◽  
Zainab Ali Abbood ◽  
hameed Mutlag Farhan ◽  
Baraa Taha Yasen ◽  
Mohammed Rashid Ahmed ◽  
...  

This study aims is to establish a small system of text-independent recognition of speakers for a relatively small group of speakers at a sound stage. The fascinating justification for the International Space Station (ISS) to detect if the astronauts are speaking at a specific time has influenced the difficulty. In this work, we employed Machine Learning Applications. Accordingly, we used the Direct Deep Neural Network (DNN)-based approach, in which the posterior opportunities of the output layer are utilized to determine the speaker’s presence. In line with the small footprint design objective, a simple DNN model with only sufficient hidden units or sufficient hidden units per layer was designed, thereby reducing the cost of parameters through intentional preparation to avoid the normal overfitting problem and optimize the algorithmic aspects, such as context-based training, activation functions, validation, and learning rate. Two commercially available databases, namely, TIMIT clean speech and HTIMIT multihandset communication database and TIMIT noise-added data framework, were tested for this reference model that we developed using four sound categories at three distinct signal-to-noise ratios. Briefly, we used a dynamic pruning method in which the conditions of all layers are simultaneously pruned, and the pruning mechanism is reassigned. The usefulness of this approach was evaluated on all the above contact databases


Author(s):  
Israa Al_Barazanchi ◽  
Yitong Niu ◽  
Haider Rasheed Abdulshaheed ◽  
Wahidah Hashim ◽  
Ammar Ahmed Alkahtani ◽  
...  

Recent technical developments in wi-fi networking, microelectronic integration and programming, sensors and the Internet have enabled us to create and enforce a range of new framework schemes to fulfil the necessities of healthcare-related wireless body area network (WBAN). WBAN sensors continually screen and measure patients’ indispensable signs and symptoms, and relay them to scientific monitoring for diagnosis. WBAN has a range of applications, the most necessary of which is to help patients suffering diseases to stay alive. The quality instance is the coronary heart implant sensor, whose video display unit monitors coronary heart sign and continuously transmits it. This setup eliminates the need for patients to visit the medical doctor frequently. Instead, they can take a seat at home and acquire an analysis and prescription for the disease. Today, a sizable effort is being made to increase low-power sensors and gadgets for utility in WBAN. A new framework scheme that addresses route loss in WBAN and discusses its penalties in depth is endorsed in this paper. The new framework scheme is applied to three case scenarios to obtain parameters by measuring vital information about the human body. On-body and intrabody conversation simulations are conducted. On-body conversation findings show that the route loss between transmitter and receiver rises with growing distance and frequency


Author(s):  
Mohammed Ibrahim Al-mashhadani ◽  
Kilan M. Hussein ◽  
Enas Tariq Khudir ◽  
Muhammad ilyas

Now days, in many real life applications, the sentiment analysis plays very vital role for automatic prediction of human being activities especially on online social networks (OSNs). Therefore since from last decade, the research on opinion mining and sentiment analysis is growing with increasing volume of online reviews available over the social media networks like Facebook OSNs. Sentiment analysis falls under the data mining domain research problem. Sentiment analysis is kind of text mining process used to determine the subjective attitude like sentiment from the written texts and hence becoming the main research interest in domain of natural language processing and data mining. The main task in sentiment analysis is classifying human sentiment with objective of classifying the sentiment or emotion of end users for their specific text on OSNs. There are number of research methods designed already for sentiment analysis. There are many factors like accuracy, efficiency, speed etc. used to evaluate the effectiveness of sentiment analysis methods. The MapReduce framework under the domain of big-data is used to minimize the speed of execution and efficiency recently with many data mining methods. The sentiment analysis for Facebook OSNs messages is very challenging tasks as compared to other sentiment analysis because of misspellings and slang words presence in twitter dataset. In this paper, different solutions recently presented are discussed in detail. Then proposed the new approach for sentiment analysis based on hybrid features extraction methods and multi-class Support Vector Machine (SVM). These algorithms are designed using the Big-data techniques to optimize the performance of sentiment analysis


Author(s):  
Mohammed Authman ◽  
Husam Q. Mohammad ◽  
Nazar H. Shuker

The idempotent divisor graph of a commutative ring R is a graph with vertices set in R* = R-{0}, and any distinct vertices x and y are adjacent if and only if x.y = e, for some non-unit idempotent element e2 = e ϵ R, and is denoted by Л(R). The purpose of this work is using some properties of ring theory and graph theory to find the clique number, the chromatic number and the region chromatic number for every planar idempotent divisor graphs of commutative rings. Also we show the clique number is equal to the chromatic number for any planar idempotent divisor graph. Among other results we prove that: Let Fq, Fpa are fieldes of orders q and pa respectively, where q=2 or 3, p is a prime number and a Is a positive integer. If a ring R @ Fq x Fpa . Then (Л(R))= (Л(R)) = *( Л(R)) = 3.


Author(s):  
Hamza Abubakar ◽  
Abdullahi Muhammad ◽  
Smaiala Bello

The Boolean Satisfiability Problem (BSAT) is one of the most important decision problems in mathematical logic and computational sciences for determining whether or not a solution to a Boolean formula.. Hopfield neural network (HNN) is one of the major type artificial neural network (NN) popularly known for it used in solving various optimization and decision problems based on its energy minimization machinism. The existing models that incorporate standalone network projected non-versatile framework as fundamental Hopfield type of neural network (HNN) employs random search in its training stages and sometimes get trapped at local optimal solution. In this study, Ants Colony Optimzation Algorithm (ACO) as a novel variant of probabilistic metaheuristic algorithm (MA) inspired by the behavior of real Ants, has been incorporated in the training phase of Hopfield types of the neural network (HNN) to accelerate the training process for Random Boolean kSatisfiability reverse analysis (RANkSATRA) based for logic mining. The proposed hybrid model has been evaluated according to robustness and accuracy of the induced logic obtained based on the agricultural soil fertility data set (ASFDS). Based on the experimental simulation results, it reveals that the ACO can effectively work with the Hopfield type of neural network (HNN) for Random 3 Satisfiability Reverse Analysis with 87.5 % classification accuracy


Author(s):  
baraa I. Farhan ◽  
Ammar D.Jasim

The use of deep learning in various models is a powerful tool in detecting IoT attacks, identifying new types of intrusion to access a better secure network. Need to developing an intrusion detection system to detect and classify attacks in appropriate time and automated manner increases especially due to the use of IoT and the nature of its data that causes increasing in attacks. Malicious attacks are continuously changing, that cause new attacks. In this paper we present a survey about the detection of anomalies, thus intrusion detection by distinguishing between normal behavior and malicious behavior while analyzing network traffic to discover new attacks. This paper surveys previous researches by evaluating their performance through two categories of new datasets of real traffic are (CSE-CIC-IDS2018 dataset, Bot-IoT dataset). To evaluate the performance we show accuracy measurement for detect intrusion in different systems.


Sign in / Sign up

Export Citation Format

Share Document