Preferred Language
Articles
/
-hj1EZYBVTCNdQwCwoES
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Therefore, our work also focuses on creating an automated system that can recommend the right skills and courses to help the desired candidates by using Natural Language Processing to analyze writing style (linguistic fingerprints) and also used to measure style and analyze word frequency from the submitted resume. Through semantic search and relying on individual resumes, forensic experts can query the huge semantic datasets provided to companies and institutions and facilitate the work of government forensics by obtaining official institutional databases. With global cybercrime and the increase in applicants seeking work and leveraging their multilingual data, Natural Language Processing (NLP) is making it easier. Through the important relationship between Natural Language Processing (NLP) and digital forensics, NLP techniques are increasingly being used to enhance investigations involving digital evidence and leverage the support of NLP for open-source data by analyzing massive amounts of public data.

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
Proposed Framework for Semantic Segmentation of Aerial Hyperspectral Images Using Deep Learning and SVM Approach
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Using PCR and Gel Electrophoresis Techniques to Molecular Confirm and Detection for Flowering Gene Presence in Maize Hybrids
...Show More Authors
Abstract<p>The laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Oct 24 2024
Journal Name
Applied Water Science
Tectonic activation and the risk of Ilisu Dam collapse to Iraq through modelling and simulation using HEC-RAS
...Show More Authors
Abstract<p>Floods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.</p><p>The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 25 2020
Journal Name
Al-nahrain Journal For Engineering Sciences
Comparison Sequences of Pick and Place System Controlled Using PLC
...Show More Authors

Pick and place system is one of the significant employments of modern robots utilized in industrial environments. The objective of this research is to make a comparison of time sequences by combining multiple axes of sequences. A pick-place system implemented with pneumatic linear double-acting cylinders to applicator in automated systems processes for manufacturing. The challenge of 3-axes movement control was achieved using the PLC (Programmable Logic Controller) controller such that the merging between two or three axes was achieved according to the selected sequence of the program. The outcomes show the contrasted sequences and the reference in a constant velocity. The main variable parameter is the number of steps for each sequ

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The efficiency of Using Attribute and Performance- Based Activity Methods to Raise the Level of Control Deviation A field study in Jaber Bin Hayyan Factory
...Show More Authors

Cost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles

View Publication Preview PDF
Crossref