Iraqi Journal for Computers and Informatics
Latest Publications


TOTAL DOCUMENTS

195
(FIVE YEARS 23)

H-INDEX

1
(FIVE YEARS 0)

Published By University Of Information Technology And Communications

2520-4912, 2313-190x

2020 ◽  
Vol 46 (1) ◽  
pp. 1-10
Author(s):  
Dhafar Hamed Abd ◽  
Ahmed T. Sadiq ◽  
Ayad R. Abbas

Now day’s text Classification and Sentiment analysis is considered as one of the popular Natural Language Processing (NLP) tasks. This kind of technique plays significant role in human activities and has impact on the daily behaviours. Each article in different fields such as politics and business represent different opinions according to the writer tendency. A huge amount of data will be acquired through that differentiation. The capability to manage the political orientation of an online article automatically. Therefore, there is no corpus for political categorization was directed towards this task in Arabic, due to the lack of rich representative resources for training an Arabic text classifier. However, we introduce political Arabic articles dataset (PAAD) of textual data collected from newspapers, social network, general forum and ideology website. The dataset is 206 articles distributed into three categories as (Reform, Conservative and Revolutionary) that we offer to the research community on Arabic computational linguistics. We anticipate that this dataset would make a great aid for a variety of NLP tasks on Modern Standard Arabic, political text classification purposes. We present the data in raw form and excel file. Excel file will be in four types such as V1 raw data, V2 preprocessing, V3 root stemming and V4 light stemming.


2020 ◽  
Vol 46 (1) ◽  
pp. 11-19
Author(s):  
Wid Akeel Awadh ◽  
Ali Salah Hashim ◽  
Alaa Khalaf Hamoud

The importance of big data implementations is increased due to large amount of gathered data via the online gates. The businesses and organizations would benefit from the big data analysis i.e. analyze the political, market, and social interests of the people. The Internet of Things (IoT) presents many facilities that support the big data transfer between various Internet objects. The integration between the big data and IoT offer a lot of implementations in the daily life like GPS, Satellites, and airplanes tracking. There are many challenges face the integration between big data transfer and IoT technology. The main challenges are the transfer architecture, transfer protocols, and the transfer security. The main aim of this paper is to review the useful architecture of IoT for the purpose of big data processing with the consideration of the various requirements such as the transfer protocol. This paper also reviews other important issues such as the security requirements and the multiple IoT applications. In addition, the future directions of the IoT-Big data are explained in this paper.


2020 ◽  
Vol 46 (1) ◽  
pp. 21-31
Author(s):  
Tola John Odule ◽  
Ademola Olusola Adesina

Creating a useful portable browser or program is a demanding challenge for organisations due to the size constraints of the display area, which additionally is contingent on usability, internet connectivity, efficient backup power and mobility. Users also expect performance equivalent to that of microcomputers. Portable display programmers need to surmount these challenges without compromising users’ concerns for safety and confidentiality. Various works in the past couple of years revealed the ability of a strongly perceived artistic architecture of a mobile website as a push to overcome clients’ reduced  skill. The investigation conducted in this report sought to determine the distinct impact of eight artistic display  on the  of a mobile website or program and the corresponding clients’ . Organisations may thus take advantage of this knowledge to improve usage, trust, frequency of adoption and consequently financial rewards on m-commerce applications. This study uses a  with a screening objective. Data for the experiment was sourced through a web-based questionnaire program, . At the same time, social network sites were used to disseminate the questionnaires to enable gathering a good number of respondents. The data collection instrument had  statements with  threshold for  Ninety-six  participants took part in the inquiry. In contrast, seventy-six  participants completed the exercise, signifying an estimated.  was used in the study of the association concerning the .  package was utilised in the evaluation of the . Findings revealed that artistic architecture bears a substantial impact on  of portable websites and programs as well as influences  artefacts on such platforms. , as well as the  of an application, turned out as two features with the highest impact on the two  factors. That the orientation of their effects is a reverse of the conjectured outcome suggests that future work should explore this issue.


2020 ◽  
Vol 46 (1) ◽  
pp. 32-39
Author(s):  
Intisar Shadeed Al-Mejibli ◽  
Dr. Nawaf Rasheed Alharbe

Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the developed hardware with software. Currently, the available security standards are (WEP, WPA, WPA2 and under development WPA3). These security standards are different in the offered security level base on the employed authentication method and encryption algorithms. The major objective of this paper is studying security standards and analyzing them based on their features. In addition to presenting a detailed review about WPA3 and its improvements over the older security standards. The conducted evaluations explained the differences among the Wi-Fi security standards in term of the offered security level, software and hardware requirements.


2020 ◽  
Vol 46 (1) ◽  
pp. 40-47
Author(s):  
Atica M. Altaie ◽  
Rasha Gh. Alsarraj ◽  
Asmaa H. Al-Bayati

With the development of the Internet, making software is often essential, also it is complicated to succeed in the project’s development. There is a necessity in delivering software of top quality. It might be accomplished through using the procedures of Verification and Validation (V&V) via development processes. The main aim of the V&V has been checking if the created software is meeting the needs and specifications of clients. V&V has been considered as collections related to testing as well as analysis activities across the software’s full life cycle. Quick developments in software V&V were of high importance in developing approaches and tools for identifying possible concurrent bugs and therefore verifying the correctness of software. It has been reflecting the modern software V&V concerning efficiency. The main aim of this study has been retrospective review related to various researches in software V&V and conduct a comparison between them.               In the modern competitive world related to the software, the developers of software must be delivering on-time quality products, also the developers should be verifying that the software has been properly functioning and validating the product for each one of the client’s requirements. The significance of V&V in the development of software has been maintaining the quality of software. The approaches of V&V have been utilized in all stages of the System Development Life Cycle. Furthermore, the presented study also provides objectives of V&V and describes V&V tools that can be used in the process of software development, the way of improving the software’s quality.


2019 ◽  
Vol 45 (1) ◽  
pp. 20-25
Author(s):  
Shymaa Mohammed Jameel ◽  
◽  
Muayad Sadik Croock ◽  

Sign in / Sign up

Export Citation Format

Share Document