Preferred Language
Articles
/
CBadRIgBVTCNdQwCWXaU
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model based on the Spike Neural Network (SNN) called IoT-Traffic Classification (IoT-TCSNN) to classify IoT devices traffic. The model consists of four phases: data preprocessing, feature extraction, classier and evaluation. The proposed model performance is evaluated according to evaluation metrics: accuracy, precision, recall and F1-score and energy usage in comparison with two models: ML based Support Vector Machine IoT-TCSVM and ML based Deep Neural Network (IoT-TCDNN). The evaluations result has been shown that IoT-TCSNN consumes less energy in contrast to IoT-TCDNN and IoT-TCSVM. Also, it gives high accuracy in comparison with IoT-TCSVM.

Scopus Crossref
View Publication
Publication Date
Sun May 08 2011
Journal Name
Journal Of Planner And Development
The use of GIS in the analysis of existing condition of spatial distribution of wire communications network in the city of Baghdad
...Show More Authors

The increasing efficiency of the telecommunications network in the city contributes to the increase in spatial interaction between activities (to influence and mutual influence) This study is based on the idea that the upgrading of telephone services provided to citizens are done exclusively through the growth and development of all levels of the service using advanced technologies to know the problems and appropriate solutions in short time and less cost. Thus, crystallized the objectives of the study which was built for the importance of GIS in the planning of services in general, and infrastructure services, in particular, including telephone services, which is represent a point of contact between individuals on the one hand a

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Technical methods in foreign language teaching as a new method in foreign language learning
...Show More Authors

Unter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"

versteht man, dass die Forschung  sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht  in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser F

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Beliefs and Their Relationship to Self-Organized Learning Strategies at the Preparatory Stage
...Show More Authors

The study aims to identify the level of cognitive beliefs, as well as to identify the level of self-organized learning strategies among intermediate school students. The study also aims to identify the differences in the level of self-organized learning strategies among intermediate school students in term of gender, branch (scientific, literary). In order to achieve the research objectives, the researcher designed a scale to measure the cognitive beliefs. As for the scale of self-organized learning strategies, the researcher adopted a scale of (Pintrich et al. 1991), which was translated by (Izzat Abdelhamid, 1999) , For self-organized learning strategies, the sample consisted of (400) students from the research population, whic

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Microgrid Integration Based on Deep Learning NARMA-L2 Controller for Maximum Power Point Tracking
...Show More Authors

This paper presents a hybrid energy resources (HER) system consisting of solar PV, storage, and utility grid. It is a challenge in real time to extract maximum power point (MPP) from the PV solar under variations of the irradiance strength.  This work addresses challenges in identifying global MPP, dynamic algorithm behavior, tracking speed, adaptability to changing conditions, and accuracy. Shallow Neural Networks using the deep learning NARMA-L2 controller have been proposed. It is modeled to predict the reference voltage under different irradiance. The dynamic PV solar and nonlinearity have been trained to track the maximum power drawn from the PV solar systems in real time.

Moreover, the proposed controller i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Multi-Criteria Optimization for Governmental Projects Priority Ranking Depending on Fuzzified Experts’ Opinion using Hygiene Approach
...Show More Authors

Each organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Biomathematics
A non-conventional hybrid numerical approach with multi-dimensional random sampling for cocaine abuse in Spain
...Show More Authors

This paper introduces a non-conventional approach with multi-dimensional random sampling to solve a cocaine abuse model with statistical probability. The mean Latin hypercube finite difference (MLHFD) method is proposed for the first time via hybrid integration of the classical numerical finite difference (FD) formula with Latin hypercube sampling (LHS) technique to create a random distribution for the model parameters which are dependent on time [Formula: see text]. The LHS technique gives advantage to MLHFD method to produce fast variation of the parameters’ values via number of multidimensional simulations (100, 1000 and 5000). The generated Latin hypercube sample which is random or non-deterministic in nature is further integ

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Comparative Immunology, Microbiology And Infectious Diseases
Zataria Multiflora bois as an auspicious therapeutic approach against Echinococcus granulosus: Current status and future perspectives
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iosr Journal Of Computer Engineering (iosr-jce)
A New Approach to DNA, RNA, and Protein Motifs Templates Visualization and Analysis via Compilation Technique
...Show More Authors

Motifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m

... Show More
Preview PDF