Preferred Language
Articles
/
mBZlrIoBVTCNdQwCaKL4
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Development prediction algorithm of vehicle travel time based traffic data
...Show More Authors

This work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Advances In Intelligent Systems And Computing
Analysis of the Relationship Between Traffic Accidents with Human and Physical Factors in Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Wireless Personal Communications
Application of Healthcare Management Technologies for COVID-19 Pandemic Using Internet of Things and Machine Learning Algorithms
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Performance Evaluation of a PID and a Fuzzy PID Controllers Designed for Controlling a Simulated Quadcopter Rotational Dynamics Model
...Show More Authors

This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Performance evaluation of the Iraq Stock Exchange market under the financial losses of terrorism for the years 2010-2015
...Show More Authors

The Research topic seeks to analyze the "political risk and its component Terrorism Index," which consists of five indicators index, a number of terrorist operations, and the number of dead and wounded, and the size of the physical losses, based search sub-index analysis of material losses for the index terrorism and its impact on the indicators listed on the Iraq Stock Exchange Finance. As for the practical side, it has been use style gradient unrestricted and link the sample represented by ten banks listed on the Iraq Stock Exchange. was Statement the correlation and interaction of variables of the studySearch results produced that the volume of material losses is the most important indicator in the influential force and it explain a v

... Show More
View Publication
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internet of Things (IOT) Technology and its Role in Reducing air ticket Costs
...Show More Authors

Abstract:

                The aim of this research is to highlight the importance of reducing the cost of a flight ticket by using information technology and the Internet, in the process of purchasing tickets for electronic flights, and to shift from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchase process, as well as saving the cost Time, effort and money for the customer, and the researcher used the deductive approach in linking the variables (Internet of Things technology and reducing the costs of air tickets) wi

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Some Common Fixed Points Theorems of Four Weakly Compatible Mappings in Metric Spaces
...Show More Authors

                 In this paper, we proved coincidence points theorems for two pairs mappings which are defined on nonempty subset   in metric spaces by using condition (1.1). As application, we established a unique common fixed points theorems for these mappings by using the concept weakly compatible (R-weakly commuting) between these mappings.

View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Surveying the Organization of Digital Contents in the Internet Environments Using Ontological Approaches
...Show More Authors

     Ontology is a system for classifying human knowledge according to its objective characteristics and hierarchical relations through building clusters or that bear common characteristics. In digital environments, it is a mechanism that helps regulate a vast amount of information by achieving a complete link between sub-thematic concepts and their main assets. The purpose of this study is to survey the previously conducted studies that use ontology in organizing digital data on social networking sites, such as the search engines Yahoo, Google, and social networks as Facebook and their findings. Results have shown that all these studies invest ontology for the purpose of organizing digital content data, especially on

... Show More
View Publication Preview PDF
Crossref