Preferred Language
Articles
/
uRcw8I0BVTCNdQwCSylL
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
The Performance Differences between Using Recurrent Neural Networks and Feedforward Neural Network in Sentiment Analysis Problem
...Show More Authors

 With the spread use of internet, especially the web of social media, an unusual quantity of information is found that includes a number of study fields such as psychology, entertainment, sociology, business, news, politics, and other cultural fields of nations. Data mining methodologies that deal with social media allows producing enjoyable scene on the human behaviour and interaction. This paper demonstrates the application and precision of sentiment analysis using traditional feedforward and two of recurrent neural networks (gated recurrent unit (GRU) and long short term memory (LSTM)) to find the differences between them. In order to test the system’s performance, a set of tests is applied on two public datasets. The firs

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Evaluation of English Language Textbooks for Fifth and Sixth Graders Based on the American Council Criteria for Teaching Foreign Languages (ACTFL)
...Show More Authors

Abstract

This study aims to identify the extent to which the criteria of the American Council for Teaching Foreign Languages (ACTFL) are included in the English language books for the fifth and sixth graders. To achieve the objective of the study, a content analysis card was prepared, where the classification of language proficiencies was divided into five main levels (beginner, intermediate, advanced, superior, and distinguished) of the four language skills (listening, speaking, reading, and writing), The content analysis card consisted of (89) indicators distributed at the four levels of language skills as follows: Listening (17), speaking (33), reading (15), and writing (26). The study sample consisted of Engl

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
A reformation Study about the Construction Management in the Primary Stage Curricula’s for the Civil Engineering in Some of the Iraqi Universities
...Show More Authors

There is no doubt that the field of education and teaching (in any country and whatever its ruling system varies “d”) is considered one of the most specific and sensitive field, because it is related to the building of human. And as the human is a purpose (aim) and the means in the same time and he is the strategist capital, so he way of his rearing, education, choosing the educator, methods of working and the aims are considered serious matters.

     The educational process has aim determined by the society for him self through its working establishments in this field and these are the official and public establishments. And as he feels that the establishments have failed to achieve its d

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
Personality Types According to Holland's Theory and its Relationship with the Management Changing for some Administrators in the Province of Kurdistan-Iraq
...Show More Authors

The figure of personality modes determines its privileged style in the use of modern and advanced technological tools in the process of changing and developing in order to keep up with that. The proses of selection and choosing administrators in the appropriate places are the most important functions of senior management because it is easy to adopt factory buildings or establishments But this is a human world as that of machines world. So it is required to have people in the process of changing those who have a time, Knowledge, skill, ability and strong administrative personal skills, those people (leaders) should to put a clear vision for the selection and application of the change efforts and to create the necessary climate and

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
The techno-strategy of the management information system and its role in enhancing risk management in the general directorate of school and sport activity
...Show More Authors

The importance of this research lies in shedding light on the concept of techno-strategy for information management from vital and important topics that showed response for change in all areas of life. As this necessitates the updating and changing of it in order to achieve its strategic goals and enhance its technological advantage. The research problem looked at the role of the information technology system (ITS) in enhancing risk management in general directorates for sports and school activity from the viewpoint of its department heads. The research aimed at the relationship of information techno-strategy in risk management and the ratios of the contribution of information techno-strategy in risk management from the viewpoint of heads o

... Show More
Preview PDF
Scopus
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Cloud-based Voice Home automation System Based on Internet of Things
...Show More Authors

    The rapid development of automation industries and technologies has shown incredible prospects for transforming our homes into a smart home automation system, which are more secure than a simple home. This paper proposes a home application based on voice and text called the Automated Control and Monitoring System (ASCM). This application can be utilized by both normal and vision-impaired people by using with a mobile phone.

The application allows users to send voice commands through Google Assistant installed on Android to control the appliances. They can also have complete monitoring by logging onto the ThingSpeak dashboard, which displays a device status indicator and sends alert messages in the event of dang

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entry cost based on activity-based cost specifications and comparative study
...Show More Authors

Several recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Proceedings Of The Aintec 2014 On Asian Internet Engineering Conference - Aintec '14
LTE Peak Data Rate Estimation Using Modified alpha-Shannon Capacity Formula
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF