Wasit Journal of Computer and Mathematics Science
Latest Publications


TOTAL DOCUMENTS

9
(FIVE YEARS 9)

H-INDEX

0
(FIVE YEARS 0)

Published By Wasit University

2788-5879, 2788-5887

2021 ◽  
Vol 1 (1) ◽  
pp. 17-30
Author(s):  
Jamal Kh-madhloom

Fog computing is a segment of cloud computing where a vast number of peripheral equipment links to the internet. The term "fog" indicates the edges of a cloud in which high performance can be achieved. Many of these devices will generate voluminous raw data as from sensors, and rather than forward all this data to cloud-based servers to be processed, the idea behind fog computing is to do as much processing as possible using computing units co-located with the data-generating devices, so that processed rather than raw data is forwarded, and bandwidth requirements are reduced. A major advantage of processing locally is that data is more often used for the same computation machine which produced the data. Also, the latency between data production and data consumption was reduced. This example is not fully original, since specially programmed hardware has long been used for signal processing. The work presents the integration of software defined networking with the association of fog environment to have the cavernous implementation patterns in the health care industry with higher degree of accuracy.


2021 ◽  
Vol 1 (1) ◽  
pp. 31-42
Author(s):  
Mohammad Hasan Abd

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain programming utilizing robustness and different devices. The blockchain based mix is currently days utilized for e-administrations and military applications for the noticeable security based applications. To work with the high performance approaches and algorithms, the blockchain technology is quite prominent and used in huge performance aware patterns whereby the need to enforce the security is there. The work integrates the usage patterns of blockchain technologies so that the overall security and integrity can be improved in which there is immutability and strength based algorithms for enforce the security measures.


2021 ◽  
Vol 1 (1) ◽  
pp. 84-92
Author(s):  
Karim Hashem Kreidi

Now days, a number of corporate as well as social applications are connected with wireless technologies which are covered under the domain of Internet of Things (IoT) and Cloud of Things (CoT). To work with the development and implementation of these scenarios, there is need of high performance costly gadgets which are difficult for the self finance researchers and small organizations. To cope up with the financial aspects of developing and getting the results from advanced wireless environment, the use of simulators and software libraries is done. In wireless environment, the segment of Underwater Wireless Sensor (UWSN) or Underwater Acoustic Network (UAN) is quite prominent which are used for the underwater applications including Military, Naval and Underwater Surveillance. Underwater sensor networks are famous for researchers and engineers in wireless technology. This field offers a lot of academic work in different disciplines. The main challenge of this UWSN is the energy saving for sensor nodes. For this cause, the location of sensor nodes shifts about regularly. There are several algorithms for energy production and collection, but this area is still in need of study due to political and national security concerns.


2021 ◽  
Vol 1 (1) ◽  
pp. 94-105
Author(s):  
Zain Alabdeen A.N.ALSAFI ◽  
Ahmed A.H. Al-Aridhee ◽  
Saif Razzaq Al-Waily

In this research, the williamson flow with heat transfer through the tube of compliant wall properties with slip at boundaries is analyzed analytically. An approximated theoretical model is constructed of springbacked flexible compliant walls pipe, chosen to move as sinusoidal wave


2021 ◽  
Vol 1 (1) ◽  
pp. 66-83
Author(s):  
Rawaa Ismael Farhan ◽  
Abeer Tariq Maolood ◽  
NidaaFlaih Hassan

Network Intrusion Detection System (NIDS) detects normal and malicious behavior by analyzing network traffic, this analysis has the potential to detect novel attacks especially in IoT environments. Deep Learning (DL)has proven its outperformance compared to machine learning algorithms in solving the complex problems of the real-world like NIDS. Although, this approach needs more computational resources and consumes a long time. Feature selection plays a significant role in choosing the best features only that describe the target concept optimally during a classification process. However, when handling a large number of features the selecting such relevant features becomes a difficult task. Therefore, this paper proposes Enhanced BPSO using Binary Particle Swarm Optimization (BPSO) and correlation–based (CFS) classical statistical feature selection approach to solve the problem on BPSO feature selection. The selected feature subset has evaluated on Deep Neural Networks (DNN) classifiers and the new flow-based CSE-CIC-IDS2018 dataset. Experimental results have shown a high accuracy of 95% based on processing time, detection rate, and false alarm rate compared with other benchmark classifiers.


2021 ◽  
Vol 1 (1) ◽  
pp. 52-65
Author(s):  
Qays Algahreeb ◽  
Florica Moldoveanu ◽  
Alin Moldoveanu

Public speaking started to gain much attention when it comes to phobias, which is anxiety for new presenters. In some cases, specialists consider that avoiding the phenomenon which causes the phobia is sufficient treatment; in others, the exact opposite, being gradually exposed to the object of fear may lead to a cure. We have to start looking for other psychotherapeutic methods, innovative ones, to help people surpass their immense fears and improve their ability to give presentations. The current article presents a survey on discovering fear and anxiety when preventing and treating it and analyses their utility as tools for learning how to overcome this type of phobias, thus improving presentation ability. Using IT-based solutions for treating presented this fear, especially anxiety for new presenters. The current methods of dealing with the fear of public speaking will be reviewed, as well as Clarify the technology (tools, systems, and applications) based used for detecting and treatment. We will analyze research that studies how to detect fear and the ways to treat it, the concept behind their mechanism and the possibility of exploiting them in presentations.  therefore, the paper debates these IT instruments and applications in this field. Based on the results of the survey, we will propose an appropriate mechanism for detecting degrees and types of fear when presenting presentations and their treatment.


2021 ◽  
Vol 1 (1) ◽  
pp. 43-51
Author(s):  
Sundresan Perumal

Kevin Ashton coined the phrase Internet of Things in 1999 with high performance implementation for corporate and social world. Thanks to the success of high-performing Internet of Things (IoT) whereby the tags and sensors are the foundation for IoT implementation of radio frequency identification with enormous implementation patterns. Real world objects and systems that are remotely managed using program- based tools may be outfitted with RFID tags. Radio frequency recognition devices may identify objects and sense information. Very thin micro-sized RFID chips that can attach remotely are built. The internet of things will cross over USD 267 billion in 2020. According to the report by Gartner, there would be $273 billion linked devices around the world in 2014. The quantity, which is equal to 8.4 billion goods, is 31% more than last year. This study examines security and productivity in the IoT. It is very popular to use Internet of Things (IoT) in robotics because of sensor sensors, advanced wireless technology and use of software programming. Both wireless IP-based systems come with built-in GPS modules. The utility of smart cities and home automation was increasingly accentuated by the appearance of vast databases of smart IP-based sensors. Within the scope of this study, one of the goals is to establish simulation trends that can cover protection weakness of the Internet of Things. In the novel, the simulation processes were implemented through Contiki Cooja and CupCarbon. The modern age is greatly being affected by impossibly sophisticated technical devices. It is treated under the umbrella of Internet of Things (IoT). Several applications are commonly using IoT linked technologies to a broad variety of purposes. IoT contains many other concepts such as universal computing, widespread computing, ambient computing, among several others. The work presents the implementation using high performance framework for the security in the IoT environment using security mechanism on IPv6.


2021 ◽  
Vol 1 (1) ◽  
pp. 9-16
Author(s):  
HM Verma

IoT and robotics industries are united to create the Internet of Robotics Things (IoRT). IoRT is the idea of intelligent machines monitoring the environment around them and using local and distributed intelligence to decide on courses of action and making decisions accordingly. IOT is a network of devices that are connected to the internet, including devices and equipment connected by sensors. These elements are essential for businesses trying to drive customer facing innovation, data-driven decisions, new applications, digital transformation, business models and revenue streams. Robots need to maintain great flexibility to react to unexpected conditions. AI helps these robots to deal with any unforeseen circumstances. Robotics and Simulation are key elements in the solutions of advancing manufacturing and production. Many people often think of IoT and robotics technologies in separate fields but they have been getting increasingly close in recent years. The In this way, such processes are used to avoid the loss of human life and the automation of processes which need high performances. Robotic and simulated application have been successfully deployed to functions in real world scenarios that man will not be able to accomplish such as study of volcanoes, and space center on its own. Furthermore, the robotic implementations give robots the opportunity to efficiently and safely function in the adverse conditions without being injured physically.


2021 ◽  
Vol 1 (1) ◽  
pp. 1-8
Author(s):  
J.k. Sumathi

The key advances in Computer Vision and Optical Image Processing are the emerging technologies nowadays in diverse fields including Facial Recognition, Biometric Verifications, Internet of Things (IoT), Criminal Investigation, Signature Identification in banking and several others. Thus, these applications use image and live video processing for facilitating different applications for analyzing and forecasting." Computer vision is used in tons of activities such as monitoring, face recognition, motion recognition, object detection, among many others. The development of social networking platforms such as Facebook and Instagram led to an increase in the volume of image data that was being generated. Use of image and video processing software is a major concern for Facebook because the photos and videos that people post to the social network are doctored images. These kind of images are frequently cited as fake and used in malevolent ways such as motivating violence and death. You need to authenticate the questionable images before take action. It is very hard to ensure photo authenticity due to the power of photo manipulations. Image formation can be determined by image forensic techniques. The technique of image duplication is used to conceal missing areas.


Sign in / Sign up

Export Citation Format

Share Document