item: #1 of 91 id: uhdjst-1 author: Al-Janabi, Sufyan T.; Al-Khateeb, Belal; Abd, Ahmed J. title: Intelligent Techniques in Cryptanalysis: Review and Future Directions date: 2017-04-12 words: 6127 flesch: 54 summary: A. Cryptanalysis of Monoalphabetic Substitution Ciphers The GA attack on such cipher can be implemented by generated initial keys consisting of permutation of the set of letters. This particular class of algorithms can be used because the automated breaking of such ciphers is very difficult. keywords: anns; ciphers; ciphertext; cryptanalysis; gas; key; letters; neural; science; techniques; type; vol cache: uhdjst-1.pdf plain text: uhdjst-1.txt item: #2 of 91 id: uhdjst-1007 author: Albarzinji, Ikbal Muhammed; Anwar, Arol Muhsen; Karim, Hawbash Hamadamin; Ahmed, Mohammed Othman title: Photosynthetic Pigments and Stomata Characteristics of Cowpea (Vigna sinensis savi) under the Effect of X-Ray Radiation date: 2022-09-24 words: 4632 flesch: 61 summary: California black-eye to X-ray radiation in two different locations (In target or 30 cm out of target) inside the radiation chamber, for four different exposure times (0, 5, 10, or 20 min), to study the effect on some characteristics of seedling components. Exposing cowpea seeds to X-ray radiation in the target of the radiation source increased significantly stem and leave dry matter percent compared with the one out of the target location, whereas increasing the time of exposure decreased the percent of dry matter of stem and leaves. keywords: chlorophyll; effects; exposure; leaves; min; radiation; ray; stomata; target; vol cache: uhdjst-1007.pdf plain text: uhdjst-1007.txt item: #3 of 91 id: uhdjst-1030 author: Ahmed, Warmn; Noor Ghazi M. Jameel title: Malicious URL Detection Using Decision Tree-based Lexical Features Selection and Multilayer Perceptron Model date: 2022-11-13 words: 7492 flesch: 62 summary: Index Terms: Multilayer Perceptron, Lexical Feature, Feature Selection, Malicious URL, Synthetic Minority Oversampling Technique Corresponding author’s e-mail:  warmn.faiq.a@spu.edu.iq Received: 20-08-2022 Accepted: 01-10-2022 [1]. In this paper, the multilayer perceptron (MLP) model is used to detect malicious URLs based on the features of the URLs. keywords: boolean; data; dataset; detection; features; learning; machine; model; number; section; url; url detection; urls; vol; websites cache: uhdjst-1030.pdf plain text: uhdjst-1030.txt item: #4 of 91 id: uhdjst-1031 author: Kaka-Khan, Kanaan Mikael; Mahmud, Hoger; Ali, Aras Ahmed title: Rough Set-Based Feature Selection for Predicting Diabetes Using Logistic Regression with Stochastic Gradient Decent Algorithm date: 2022-10-18 words: 5898 flesch: 62 summary: Based on their results, they claim that their approach raises diabetes prediction accuracy to 95% compared to other existing approaches. Proposed diabetes prediction method. keywords: accuracy; dataset; diabetes; features; group; model; prediction; regression; rst; table; vol cache: uhdjst-1031.pdf plain text: uhdjst-1031.txt item: #5 of 91 id: uhdjst-1047 author: Aziz, Miran Hakim; Alan Anwer Abdulla title: Computer-Aided Diagnosis for the Early Breast Cancer Detection date: 2023-01-12 words: 5034 flesch: 55 summary: The processing and analysis of breast mammogram images plays a significant role in the early diagnosis of breast cancer. There are numerous types of cancers such as breast cancer, brain tumors, lung cancer, skin cancer, and blood cancer. keywords: accuracy; breast; breast cancer; cad; cancer; detection; features; image; rate; system cache: uhdjst-1047.pdf plain text: uhdjst-1047.txt item: #6 of 91 id: uhdjst-1057 author: Sofihussein, Hasan Qader title: Prevalence of Vitamin D Deficiency among Pregnant Women in Sulaimaneyah City-Iraq date: 2023-01-02 words: 4268 flesch: 58 summary: The present work has been carried out to demonstrate the prevalence of Vitamin D deficiency among pregnant women in the Sulaimaneyah City/ Kurdistan Region of Iraq. Because of the many risk factors of Vitamin D deficiency and a series of health consequences, the government needs to take a step to address the problem, including raising awareness among the community about the burden of the situation and how to increase obtaining optimum Vitamin D from different sources. keywords: deficiency; journal; levels; study; vitamin; vitamin d; vol; women cache: uhdjst-1057.pdf plain text: uhdjst-1057.txt item: #7 of 91 id: uhdjst-1074 author: Abdulla, Azeez Rahman; M. Jameel, Noor Ghazi title: A Review on IoT Intrusion Detection Systems Using Supervised Machine Learning: Techniques, Datasets, and Algorithms date: 2023-03-01 words: 9900 flesch: 55 summary: Many points were observed and needed further study like using and collecting real IoT intrusion detection datasets for training and testing ML models, real time, and lightweight IDSs are required that need less detection time and resources consumption. In the last few years, advancement in artificial intelligent (AI) such as machine learning (ML) techniques has been used to improve IoT intrusion detection system (IDS). keywords: accuracy; algorithms; attacks; classification; dataset; detection; ids; internet; intrusion; intrusion detection; iot; journal; network; new; systems; things; vol cache: uhdjst-1074.pdf plain text: uhdjst-1074.txt item: #8 of 91 id: uhdjst-1075 author: Al-Ani, Muzhir Shaban title: ECG Signal Recognition Based on Lookup Table and Neural Networks date: 2023-01-21 words: 6359 flesch: 58 summary: ECG signals provide useful information about the rhythm and the operation of the heart. Heart beats extracted from ECG signals can be categorized into classes that are: Normal, atrial premature, and ventricular escape beats [5]. keywords: approach; ecg; ecg signal; fig; heart; journal; network; neural; rate; recognition; signal; technology; vol cache: uhdjst-1075.pdf plain text: uhdjst-1075.txt item: #9 of 91 id: uhdjst-1076 author: Mustafa, Hanar Hoshyar; Nabi, Rebwar M. title: Kurdish Kurmanji Lemmatization and Spell-checker with Spell-correction date: 2023-02-22 words: 6956 flesch: 61 summary: However, the system would replay with the message “Input word is not in the dataset” if there was no match between the entered noun and nouns in the dataset. Due to the incorrect spelling of the word, which confounded the system and prevented it from locating the specific base root of the word, the system replayed with the message “Input word is not in the dataset.” keywords: accuracy; correction; dataset; kurdish; lemmatization; noun; root; spell; system; verb; word cache: uhdjst-1076.pdf plain text: uhdjst-1076.txt item: #10 of 91 id: uhdjst-1086 author: Hameed, Wafaa Mustafa; Ali, Nzar A. title: Missing value imputation Techniques: A Survey date: 2023-03-28 words: 6505 flesch: 56 summary: This paper also explores a few satisfactory choices of methods to estimate missing values to be used by different researchers on this discipline of study. While missing values are distributed uniformly across all measurements, then we find the records to be absolutely randomly missing. keywords: data; dataset; imputation; information; journal; mean; method; techniques; use; values; variable; vol cache: uhdjst-1086.pdf plain text: uhdjst-1086.txt item: #11 of 91 id: uhdjst-1087 author: D. Majeed, Hamsa; Nariman, Goran Saman title: Construction of Alphabetic Character Recognition Systems: A Review date: 2023-02-18 words: 7663 flesch: 57 summary: These unique features make the process of script identification for Abjads relatively simpler compared to other scripts, particularly because of the long cursive strokes with dots and the right-to-left writing direction, making it easier for recognition systems in pen computing. In recognition systems of any language, the printed characters usually achieve a high recognition rate because it is considered in regular form, clean, have the same style, and have similar shapes and lines, and that facilitates the learning operation and therefore raises the accuracy of recognition in the testing phase. keywords: character; dataset; handwritten; international; journal; level; recognition; review; science; script; system; technology; text; vol; writing cache: uhdjst-1087.pdf plain text: uhdjst-1087.txt item: #12 of 91 id: uhdjst-1097 author: Kanbar, Asan Baker; Faraj, Kamaran title: Limitations of Load Balancing and Performance Analysis Processes and Algorithms in Cloud Computing date: 2023-03-18 words: 4931 flesch: 52 summary: Hence, it faces many challenges and the main problem of cloud computing is load balancing which lowering the performance of the computing resources Since it faces various challenges, the most significant problem of cloud computing is load balancing, which degrades the performance of the computing resources. keywords: algorithm; balancing; cloud; computing; load; migration; resource; scheduling; task; time; vol cache: uhdjst-1097.pdf plain text: uhdjst-1097.txt item: #13 of 91 id: uhdjst-1100 author: Mohammed, Hawar Mardan; Lafi, Samir Yonis title: Exploring the Relationship between Attitudes and Blood Glucose Control among Patients with Type 2 Diabetes Mellitus in Chamchamal Town, Kurdistan, Iraq date: 2023-04-12 words: 6461 flesch: 60 summary: [1] R. M. Anderson and M. M. Funnell. [12] M. A. Powers, J. Bardsley, M. Cypress, P. Duker, M. M. Funnell, A. H. Fischl, M. D. Maryniuk, L. Siminerio and E. Vivian. keywords: attitude; blood; control; diabetes; education; glucose; patients; self; study; test; type; vol cache: uhdjst-1100.pdf plain text: uhdjst-1100.txt item: #14 of 91 id: uhdjst-1101 author: Hossein, Mahmood Ahmad title: Identification of Blood Protozoa Infestation Transmitted by Vector Tikes among Awassi Sheep Herds in Kifri City, Kurdistan Region of Iraq date: 2023-08-08 words: 3594 flesch: 67 summary: Furthermore, the predominant tick among infected sheep in the study area is Rhipicephalus tick, and the infection rate of the sheep with the tick was higher than Babesiosis species in Kifri area. Out of 150 samples of infected sheep in this study, 96 samples of sheep were infected with ticks, and a total of 204 ticks were isolated from them. keywords: babesia; blood; kifri; ovis; protozoa; samples; sheep; ticks; vol cache: uhdjst-1101.pdf plain text: uhdjst-1101.txt item: #15 of 91 id: uhdjst-1108 author: Manguri, Kamaran Hussein Khdir; Mohammed, Aree Ali title: A Review of Computer Vision–Based Traffic Controlling and Monitoring date: 2023-08-10 words: 7035 flesch: 53 summary: Moreover, recent published articles in four related topics including density estimation investigation, traffic sign detection and recognition, accident detection, and emergency vehicle detection are investigated. Computer vision-based architecture of traffic signaling controlling and monitoring includes image acquisition, preprocessing and applying advance computer vision techniques density estimation, traffic sign detection and recognition, accident detection, and emergency vehicle detection. keywords: accident; computer; controlling; density; detection; emergency; image; method; monitoring; recognition; review; sign; time; traffic; vehicles; vision; vol cache: uhdjst-1108.pdf plain text: uhdjst-1108.txt item: #16 of 91 id: uhdjst-1179 author: Majeed, Hawre Latif; Ali, Diary Jalal; Mohammed, Twana Latif title: Analyzing the Performance of Bitcoin to Gold Prices, the Telecommunications Market, the Stock Price Index, and Insurance Companies’ Performance from (March 1, 2021–September 4, 2023) date: 2023-08-20 words: 10211 flesch: 53 summary: Bitcoin prices rose from under US$1000 in 2014 to over US$17,000 in 2018.2 Dash prices rose from below US$2 in 2014 to above US$400 in 2018 This suggests that the predictors collectively account for a significant portion of the variability in Bitcoin prices. keywords: bitcoin; btc; coefficient; companies; gold; insurance; insurance companies; model; price; statistic; stock; telecommunications; test; value; vol cache: uhdjst-1179.pdf plain text: uhdjst-1179.txt item: #17 of 91 id: uhdjst-12 author: Yahya, Yahya Ahmed; Al-Hammouri, Ahmad T. title: Transmission Control Protocol Global Synchronization Problem in Wide Area Monitoring and Control Systems date: 2017-08-29 words: 2661 flesch: 65 summary: In this work, verification of the extent found a problem in transmission control protocol (TCP) which is called global synchronization and its impact on utilizing the buffer of the routers. The buffer of router when using transmission control protocol with the FIFO queue algorithm Fig. 7. keywords: buffer; fig; pmus; scenario; synchronization; tcp cache: uhdjst-12.pdf plain text: uhdjst-12.txt item: #18 of 91 id: uhdjst-14 author: Jasim, Wesam M. title: Model Dependent Controller for Underwater Vehicle date: 2017-08-29 words: 3149 flesch: 67 summary: “Sliding mode control of autonomous underwater vehicles.” Underwater vehicle frames Wesam M. Jasim: Model Dependent Controller for Underwater Vehicle UHD Journal of Science and Technology | August 2017 keywords: controller; journal; model; vehicle cache: uhdjst-14.pdf plain text: uhdjst-14.txt item: #19 of 91 id: uhdjst-15 author: Awlla, Ardalan Husin title: A Hybrid Simulated Annealing and Back-propagation Algorithm for Feed-forward Neural Network to Detect Credit Card Fraud date: 2017-08-29 words: 3589 flesch: 59 summary: Identifying credit card fraud is a tough effort when applying traditional methods; therefore, the growth of the credit card fraud discovery model has matured off significance, either in the educational or trades the society recently. Credit card fraud detection belongs to the classification and identification problem with a large number of non-linear A Hybrid Simulated Annealing and Back-propagation Algorithm for Feed-forward Neural Network to Detect Credit Card Fraud Ardalan Husin Awlla Ministry of Education, Sulaimani 46001, Iraq A B S T R A C T Due to the ascent and fast development of E-commerce, utilization of credit cards for online buys has significantly expanded, and it brought about a blast in the credit card fraud. keywords: algorithm; card; credit; detection; fraud; network cache: uhdjst-15.pdf plain text: uhdjst-15.txt item: #20 of 91 id: uhdjst-153 author: Hussen, Hoger Mahmud title: A Blockchain-based Service Provider Validation and Verification Framework for Healthcare Virtual Organization date: 2018-08-28 words: 5804 flesch: 57 summary: In the search for new ways to provide health care blockchain technology is seen by many researchers as a revolution with the potential to change the way heath care is provided currently [32], [33]. [2], and we have explained the benefits of using such concepts in providing virtual health care. keywords: blockchain; care; framework; health; provider; service; technology; validation; vbe; verification; virtual cache: uhdjst-153.pdf plain text: uhdjst-153.txt item: #21 of 91 id: uhdjst-154 author: Issa, Hayder Mohammed; Alshatteri, Azad title: Assessment of Heavy Metals Contamination in Drinking Water of Garmian Region, Iraq date: 2018-09-08 words: 9914 flesch: 64 summary: Strontium Sr and selenium Se mean values in water samples are 3.838 and 0.038 mg/L that is close to the maximum permissible limits MPL of 4, and 0.04 mg/L, respectively, hence this reveals the contribution of Sr and Se in the drop of drinking water quality of the area. Heavy Metals in Drinking Water Samples Presence of heavy metals in drinking water samples (groundwater and surface water) from the 16 different sites in Garmian region is illustrated in Tables II and III. keywords: area; bdl; bdl bdl; contamination; drinking; drinking water; garmian; hpi; journal; locations; metals; parameters; pollution; quality; region; samples; study; vol; water; water quality; water samples cache: uhdjst-154.pdf plain text: uhdjst-154.txt item: #22 of 91 id: uhdjst-16 author: Mahmud, Hoger title: A Simple Software Rejuvenation Framework Based on Model Driven Development date: 2017-08-30 words: 4808 flesch: 56 summary: The objective of software rejuvenation is to rollback a system continuously to maintain the normal operation of the system and prevent failures. MDD is a generic framework that can accommodate both application specific and application generic classes of software rejuvenation. keywords: aging; development; framework; model; rejuvenation; software; software aging; software rejuvenation; system; vol cache: uhdjst-16.pdf plain text: uhdjst-16.txt item: #23 of 91 id: uhdjst-17 author: Kaka-Khan, Kanaan M. title: Building Kurdish Chatbot Using Free Open Source Platforms date: 2017-08-30 words: 2715 flesch: 65 summary: This paper is an attempt to bridge the gap between chatbots and Kurdish users. I present a number of challenges for Kurdish chatbot at the last section of this work. keywords: chatbot; kurdish; language; science; user cache: uhdjst-17.pdf plain text: uhdjst-17.txt item: #24 of 91 id: uhdjst-172 author: Kaka-Khan, kanaan mikael title: English to Kurdish Rule-based Machine Translation System date: 2018-09-02 words: 4625 flesch: 60 summary: Microsoft research treelet translation system: Naacl 2006 europarl evaluation. The resulting translation is then evaluated manually for accuracy and completeness compared to the result produced by the popular (in Kurdish) English to Kurdish MT system. keywords: english; evaluation; inkurdish; kurdish; language; machine; rule; sentence; system; translation; vol cache: uhdjst-172.pdf plain text: uhdjst-172.txt item: #25 of 91 id: uhdjst-206 author: Hamadamin, Rawaz Rostam; Salih, Maamun Qadir; Aziz, Rostam Salam title: Environmental Impacts of Shewashok Oil Field on Sheep and Cow Meat Using Vital Trace Elements as Contamination Bioindicators date: 2019-01-25 words: 5505 flesch: 68 summary: That is due to the type of feeding which contains dry plants that may be very rich with mentioned elements, or the consumed water is containing a high level of Fe. Tables 1 and 2 show that the value of manganese element in cows’ meat sample in control group and study area is 104.9 and 110 ppb, respectively, also in sheep meat sample, the amount of manganese of control and study area is 159.5 and 179.7 ppb, respectively, and the values of the study area is higher than the control group. Two locations were selected from the province for the sampling: Focused location which is Shewashok oil field (called study area group in this article) in the southeast of Erbil and the second location is in the north of Erbil which is the main arable area and livestock farming of the province. keywords: area; control; elements; group; meat; metals; ppb; samples; sheep; study; study area; trace; vol cache: uhdjst-206.pdf plain text: uhdjst-206.txt item: #26 of 91 id: uhdjst-21 author: Rsaul, Hezha O.; Tofiq, Diary I.; Saeed, Mohammad Y.; Hamarawf, Rebaz F. title: Exploring Knowledge and Self-Care Practice Toward Skin Aging and Sun Protection among College Students in Sulaimani City-Iraq date: 2018-05-25 words: 4576 flesch: 63 summary: Skin Aging and Sun Protection Knowledge among College Students 2 UHD Journal of Science and Technology | May 2018 | Vol 2 | Issue 1 exposed to large quantities of solar UV radiation, including skin aging, pigmentary changes, and skin cancer [7]-[11]. 47% (194/402) reported that sun exposure can cause skin aging, while almost more than a half of respondents (52.5%, 217/404) were responsive of the relationship between skin cancer and sun exposure. keywords: aging; exposure; journal; knowledge; protection; skin; students; sun; vol cache: uhdjst-21.pdf plain text: uhdjst-21.txt item: #27 of 91 id: uhdjst-22 author: Rsaul, Hezha Omer title: Current Antifungal Drug Prescribing to Treat Oral Thrush in Sulaimani City-Iraq date: 2018-07-25 words: 3420 flesch: 57 summary: The most common human fungal infection is oral candidiasis (also called oral thrush), which is characterized by an overgrowth of Candida species in the superficial epithelium of the oral mucosa [8], [9]. Chlorhexidine is other antimicrobial agents that available for topical administration in oral candidiasis as mouthwash. keywords: agents; antifungal; journal; nystatin; sulaimani; vol cache: uhdjst-22.pdf plain text: uhdjst-22.txt item: #28 of 91 id: uhdjst-289 author: Kakarash, Zana Azeez; Mardukhi, Farhad title: A Review of Properties and Functions of Narrow Band Internet of Things and its Security Requirements date: 2020-03-22 words: 6602 flesch: 59 summary: The NB of IoT focuses on network coverage in a closed space, less cost, and more battery life and has the ability to connect a large number of connected devices. The NB technology of IoT can be found in the spectrum in-band of the long-term evolution (LTE) network or the fourth generation in the frequency blocks of a fourth-generation operator or unused blocks (guard band) of a fourth- generation operator. keywords: access; band; communications; data; ieee; information; internet; iot; layer; lte; network; security; technologies; technology; things; vol cache: uhdjst-289.pdf plain text: uhdjst-289.txt item: #29 of 91 id: uhdjst-3 author: Al-Anbarri, Kassim; Naief, Husham Moaied title: Application of Artificial Bee Colony Algorithm in Power Flow Studies date: 2017-04-12 words: 3809 flesch: 67 summary: The traditional algorithm for obtaining power flow solution is as follows: [1] M. A. Laughton and M. W. H. Davies, “Numerical techniques in solution of power system load flow problems. keywords: abc; algorithm; artificial; bus; flow; load; power; system; vol cache: uhdjst-3.pdf plain text: uhdjst-3.txt item: #30 of 91 id: uhdjst-317 author: Mhamad, Aras Jalal title: Using Regression Kriging to Analyze Groundwater According to Depth and Capacity of Wells date: 2019-05-29 words: 5783 flesch: 63 summary: Regression kriging results (left) and variance (right) of the residuals from the depth of wells’ model. Regression kriging results (left) and variance (right) of the residuals from the capacity of wells’ model. keywords: capacity; groundwater; kriging; prediction; regression; values; wells cache: uhdjst-317.pdf plain text: uhdjst-317.txt item: #31 of 91 id: uhdjst-332 author: Aziz, Sirwan M.; Awlla, Ardalan Husin title: Performance Analysis and Prediction Student Performance to build effective student Using Data Mining Techniques date: 2019-06-20 words: 3914 flesch: 51 summary: Teachers could be in a position to plan their lectures as according to the need of students and can give better direction to such students. The fundamental target of the planned methodology is to fabricate the classification model that tests certain attributes that may influence student performance. keywords: attributes; classification; data; decision; mining; model; performance; students; tree cache: uhdjst-332.pdf plain text: uhdjst-332.txt item: #32 of 91 id: uhdjst-345 author: Al-Ani, Muzhir Shaban title: Efficient Biometric Iris Recognition Based on Iris Localization Approach date: 2019-07-31 words: 5900 flesch: 60 summary: Optimized robust multi-sensor scheme for simultaneous video and image iris recognition. This approach tries to improve the identification process through certain processes on iris image. keywords: approach; eye; fig; image; iris; iris recognition; pupil; recognition; technology; vol cache: uhdjst-345.pdf plain text: uhdjst-345.txt item: #33 of 91 id: uhdjst-382 author: Ghareb, Mazen Ismaeel; Mohammed, Saman Ali title: Blended Learning Mobility Approach and English Language Learning date: 2019-06-20 words: 6697 flesch: 46 summary: The significance of student mobility and interuniversity exchange programs is incomprehensibly expanding, and the issue at present involves a huge spot in the motivation of instructive arrangement creators and advanced education establishments. Students Mobilities In last century in Europe, mobility of students, educators, and staff has been a be noticeable among the most universities and education system. keywords: education; erasmus; example; journal; language; learning; mobility; online; program; science; students; technology; understudies; vol cache: uhdjst-382.pdf plain text: uhdjst-382.txt item: #34 of 91 id: uhdjst-386 author: Mohammad, Mokhtar; Hussen, Hoger Mahmud title: The State of the Art in Feature Extraction Methods for EEG Classification date: 2019-07-25 words: 4885 flesch: 61 summary: In this paper, we proposed a review of EEG features that have been proposed to characterize the epileptic seizure activities for the purpose of EEG seizure detection and classification. In the next section, we review the feature extraction methods, and then, we discuss the performance of several EEG features. keywords: classification; domain; eeg; features; frequency; n n; seizure; time cache: uhdjst-386.pdf plain text: uhdjst-386.txt item: #35 of 91 id: uhdjst-4 author: Barzinjy, Azeez Abdullah Azeez; Ismail, Haidar Jalal; Ameen, Mudhaffer Mustafa title: Mathematical Modeling of Sampling, Quantization, and Coding in Sigma Delta Converter using Matlab date: 2017-04-12 words: 3523 flesch: 63 summary: Analog values that are not precisely at the code center point have an allied amount of quantization error [2]. A single binary value signifies a variety of analog values in the quantization band nearby its code center point. keywords: adaptor; analog; delta; digital; power; quantization; sampling; sigma; signal; vol cache: uhdjst-4.pdf plain text: uhdjst-4.txt item: #36 of 91 id: uhdjst-408 author: Bahmani, Elham; Darwesh, Aso Mohammad; Jamshidi, Mojtaba; Bali, Somaieh title: A Restricted Multipath Routing Algorithm in Wireless Sensor Networks Using a Virtual Cylinder: Bypassing Black hole and Selective Forwarding Attacks date: 2019-08-22 words: 5709 flesch: 63 summary: In this algorithm, sensor nodes employ a set of control messages throughout the network to explore a subset of the sinks. Average residual energy Average residual energy is the average residual energy of sensor nodes after simulation time. keywords: algorithm; attack; cylinder; energy; network; nodes; packet; sensor; sink cache: uhdjst-408.pdf plain text: uhdjst-408.txt item: #37 of 91 id: uhdjst-410 author: Hamedanizad, Raheleh; Bahmani, Elham; Jamshidi, Mojtaba; Mohammad Darwesh, Aso title: Employing Data Mining Techniques for Predicting Opioid Withdrawal in Applicants of Health Centers date: 2019-08-20 words: 5212 flesch: 57 summary: The results presented in Fig. 6 show that the proposed model with RMSE of 0.3265 has the minimum RMSE along with Decorate-J48 with RMSE of 0.3239 compared to other model indicating the desirable performance of the proposed model. Fig. 5. In this study, data mining techniques such as Neural Network, Bayesian Network, and Decision Tree are used to present prediction models to predict the success of opioid withdrawal applicants referring to a welfare organization. keywords: algorithms; bagging; data; decorate; j48; mining; model; opioid; results; terms; vol; withdrawal cache: uhdjst-410.pdf plain text: uhdjst-410.txt item: #38 of 91 id: uhdjst-419 author: Raouf, Chro Ghafoor; Ahmad, Mahmood Othman title: Suspected Protective Effect of Eruca Sativa Leaves Extract on Sperm Abnormalities in Male Albino Mice Treated with Hypericum triqutrifolium aqueous crude extract date: 2019-11-14 words: 4375 flesch: 59 summary: “Protective role of Eruca sativa extract against testicular damage in streptozotocin-diabetic rats.” This study was carried out to evaluate the effect of Eruca sativa on the cytotoxic effect of Hypericum triquetrifolium on sperm abnormalities in albino mice. keywords: effect; eruca; hypericum; journal; mice; morphology; sativa; sperm; vol cache: uhdjst-419.pdf plain text: uhdjst-419.txt item: #39 of 91 id: uhdjst-441 author: Mahmood, Sozan Abdulla; Qasim, Qani Qabil title: Big Data Sentimental Analysis Using Document to Vector and Optimized Support Vector Machine date: 2020-02-13 words: 6641 flesch: 64 summary: The objective of this study is to show the impacts of using four meta-heuristic optimizer algorithms, namely, particle swarm optimizer (PSO), modified PSO (MPSO), grey wolf optimizer (GWO), and hybrid of PSO-GWO in improving SVM classification accuracy by selecting the best values for those parameters. The results show that these optimizers have a significant impact on increasing SVM accuracy. keywords: accuracy; gwo; pso; sentiment; svm; twitter cache: uhdjst-441.pdf plain text: uhdjst-441.txt item: #40 of 91 id: uhdjst-6 author: Al-Hafidh, Majid S.; Al-Nama, Mudhafar A.; Al-Fahadi, Azher S. title: Utilization of Solar Water Heaters to Reduce Residential Electrical Load date: 2017-04-12 words: 2404 flesch: 55 summary: Fig. 4 shows the energy consumed in the water heating with and without solar water heating. “TRNSYS simulation of solar water heating system in Iraq.” keywords: energy; heating; solar; water cache: uhdjst-6.pdf plain text: uhdjst-6.txt item: #41 of 91 id: uhdjst-685 author: Ahmed, Abbas Mahmood; Allawi, Osamah Waleed title: A REVIEW STUDY ON THE ADOPTION OF CLOUD COMPUTING FOR HIGHER EDUCATION IN KURDISTAN REGION- IRAQ date: 2020-03-20 words: 8782 flesch: 54 summary: “Role and service of cloud computing for higher education system”. “Measuring the impact of ICT and e-learning on higher education system with redesigning and adapting MOODLE system in Kurdistan Region Government, KRG- Iraq”. keywords: cloud; cloud computing; computing; education; iraq; journal; learning; service; students; study; technology; universities; vol cache: uhdjst-685.pdf plain text: uhdjst-685.txt item: #42 of 91 id: uhdjst-686 author: Abdulkhaliq, Sasan Sarbast; Darwesh, Aso Mohammad title: Sentiment Analysis Using Hybrid Feature Selection Techniques date: 2020-02-13 words: 7524 flesch: 52 summary: Feature selection methods mainly divided into three categories which are Filter Methods, Wrapper Methods, and Hybrid or embedded methods. In general, feature selection methods are composed of four main steps, namely, feature subset generation, subset evaluation, stopping criterion, and result validation. keywords: accuracy; analysis; bigram; classification; data; feature; learning; selection; sentiment; svm; unigram cache: uhdjst-686.pdf plain text: uhdjst-686.txt item: #43 of 91 id: uhdjst-691 author: Mohammed, Bakhtyar Ahmed; Al-Ani, Muzhir Shaban title: Digital Medical Image Segmentation Using Fuzzy C-Means Clustering date: 2020-02-27 words: 5045 flesch: 51 summary: One of the major components of medical image analysis is medical image segmentation. Medical image segmentation participates in the diagnosis process, and it aids the processes of other medical image components to increase the accuracy. keywords: clustering; data; fcm; image; method; process; science; segmentation; step; vol cache: uhdjst-691.pdf plain text: uhdjst-691.txt item: #44 of 91 id: uhdjst-697 author: Mohammed, Zhana Fidakar; Abdulla, Alan Anwer title: Thresholding-based White Blood Cells Segmentation from Microscopic Blood Images date: 2020-02-13 words: 4864 flesch: 56 summary: Image segmentation, which is one of the most important steps in processing medical image, makes the objects inside images more meaningful. Moreover, the GCE is a region-based segmentation consistency, which measures to quantify the consistency between image segmentation of differing granularities, and it can be calculated as follows [28]: GCE S S min X S S X S S1 2 keywords: blood; cells; fig; image; processing; segmentation; technique; vol; wbcs cache: uhdjst-697.pdf plain text: uhdjst-697.txt item: #45 of 91 id: uhdjst-7 author: Ghareb, Mazen Ismaeel; Mohammed, Saman Ali title: The Future of Technology-based Classroom date: 2017-04-12 words: 4201 flesch: 52 summary: Lei and different researchers demonstrate the significance of utilizing computer technology in learning and profitability. The point of this contextual analysis is to recognize the difficulties that face university organizations from executing computer technology in every classroom with support of ministry of higher education. keywords: classroom; computer; education; information; iraq; journal; learning; technology; vol cache: uhdjst-7.pdf plain text: uhdjst-7.txt item: #46 of 91 id: uhdjst-711 author: Abdulla, Lana Abdulrazaq; Al-Ani, Muzhir Shaban title: A Review Study for Electrocardiogram Signal Classification date: 2020-06-29 words: 11203 flesch: 55 summary: ECG signal from 44 recordings of the MIT-BIH database is used to assess the classification performance, and the results demonstrate that the proposed approach achieves a significant classification ACC and superior computational efficiency than most of the state-of-the-art methods for ECG signal classification [49]. The main purpose of this work is to review the main techniques of ECG signal classification. keywords: arrhythmia; bih; classification; cnn; database; dwt; ecg; ecg classification; ecg signal; features; international; journal; methods; mit; model; neural; science; signal; svm; system; vol cache: uhdjst-711.pdf plain text: uhdjst-711.txt item: #47 of 91 id: uhdjst-726 author: Abdulkareem, Najat Hassan title: Monthly Maximum load Demand Forecasting for Sulaimani Governorate Using Different Weather Conditions Based on Artificial Neural Network Model date: 2020-07-05 words: 5402 flesch: 58 summary: Although, load forecasting is one of the major factors for economic operation of power systems. For the present, there are many algorithms for load forecasting in the computation intelligence such as fuzzy logic (Fs) [5], neural network, and genetic [6]. keywords: data; demand; error; forecasting; load; model; months; network; neural; power; sulaimani; vol cache: uhdjst-726.pdf plain text: uhdjst-726.txt item: #48 of 91 id: uhdjst-728 author: Bapir, Dunya Hars; Hama, Salih Ahmed title: Hematological Impacts of the Traffic Emissions in Sulaymaniyah Governorate date: 2020-04-25 words: 3885 flesch: 59 summary: Leukocyte measurements for traffic emission exposures and controls. Mean values of red blood cells for traffic emission exposures and controls. keywords: cells/µl; controls; counts; effects; emission; exposures; study; traffic; vol cache: uhdjst-728.pdf plain text: uhdjst-728.txt item: #49 of 91 id: uhdjst-729 author: Kakarash, Zana Azeez; Karim, Sarkhel H.Taher; Mohammadi, Mokhtar title: Fall Detection Using Neural Network Based on Internet of Things Streaming Data date: 2020-10-25 words: 4944 flesch: 61 summary: In the MobiAct dataset is that it does not embrace fall data from any old people [44]. “Analysis of public datasets for wearable fall detection systems”. keywords: data; dataset; detection; fall; ibm; information; model; science; streaming; system; vol cache: uhdjst-729.pdf plain text: uhdjst-729.txt item: #50 of 91 id: uhdjst-73 author: Al-Ani, Muzhir Shaban title: ECG Waveform Classification Based on P-QRS-T Wave Recognition date: 2018-07-25 words: 4143 flesch: 60 summary: This is an important step that covers the following: Selecting the ECG region of interest, converting ECG image into grayscale, converting ECG image into binary image, noise reduction, and ECG thinning. • ECG region of interest, in which deter mine the rectangular with both vertical and horizontal directions to restrict ECG waveform. Performance study of different Muzhir Shaban Al-Ani: ECG Waveform Classification Based on P-QRS-T Wave Recognition 14 UHD Journal of Science and Technology | May 2018 | Vol 2 | Issue 2 denoising methods for ECG signals. keywords: baseline; ecg; ecg waveform; electrocardiogram; fig; journal; qrs; signal; vol; waveform cache: uhdjst-73.pdf plain text: uhdjst-73.txt item: #51 of 91 id: uhdjst-730 author: Omar, Zana Thalage; Abed, Fadhil Salman title: A Proposed Fully Homomorphic for Securing Cloud Banking Data at Rest date: 2020-05-12 words: 4913 flesch: 68 summary: The first (FHE) model was introduced by Craig Gentry in 2009, and it was just theoretical research, but later significant progress was made on it, this research offers FHE system based on directly of factoring big prime numbers which consider open problem now, The proposed scheme offers a fully homomorphic system for data encryption and stores it in encrypted form on the cloud based on a new algorithm that has been tried on a local cloud and compared with two previous encryption systems (RSA and Paillier) and shows us that this algorithm reduces the time of encryption and decryption by 5 times compared to other systems. This paper presents a fully homomorphic system (the correct numbers and texts) based on a new algorithm that will be explained later in this paper as this scheme relies on data encryption and operations performed on it without decrypting and reducing computational complications and the time used to encrypt and decrypt data and reduce energy consumption. keywords: +1 mod; data; encryption; mod cache: uhdjst-730.pdf plain text: uhdjst-730.txt item: #52 of 91 id: uhdjst-731 author: Mohammed, Bakhtyar Ahmed; Al-Ani, Muzhir Shaban title: Review Research of Medical Image Analysis Using Deep Learning date: 2020-08-27 words: 12026 flesch: 51 summary: In general, it involves five processes, such as medical image classification, medical image detection, medical image segmentation, medical image registration, and medical image localization. In general, medical image analysis consists of five processes, such as medical image classification, medical image detection, medical image segmentation, medical image registration, and medical image localization. keywords: accuracy; analysis; brain; classification; cnn; datasets; deep; detection; et al; image; image analysis; image classification; image segmentation; imaging; journal; learning; localization; methods; modality; mri; neural; process; registration; science; segmentation; tumor; vol cache: uhdjst-731.pdf plain text: uhdjst-731.txt item: #53 of 91 id: uhdjst-735 author: Sofy Hussein, Bayan Qadir; Ismael Sharbazheri, Khalid Mahmood; Tayeb Ubaid, Nabil Adiel title: Comparison between the Effect of Local Katira Gum and Xanthan Gum on the Rheological Properties of Water-based Drilling Fluids date: 2020-07-19 words: 5133 flesch: 66 summary: For the concentrations of 20 mg, 40 mg, 60 mg, and 80 mg, four samples of Katira gum (KS1, KS2, KS3, and KS4) are prepared. The PV behavior of the mud samples developed from different concentrations of Katira gum is shown in Fig. 10. keywords: drilling; fluid; gum; katira; mud; properties; viscosity; xanthan cache: uhdjst-735.pdf plain text: uhdjst-735.txt item: #54 of 91 id: uhdjst-738 author: D. Majeed, Hamsa title: Text Detection on Images using Region-based Convolutional Neural Network date: 2020-08-02 words: 3608 flesch: 59 summary: We have put into target detection the issue of text line detection. Our research is based primarily on text identification in natural images, which is far more complex than text detection on a well-maintained text file. keywords: conference; detection; icdar; images; line; model; network; proposals; text cache: uhdjst-738.pdf plain text: uhdjst-738.txt item: #55 of 91 id: uhdjst-739 author: Dlshad, Hawar Muhamad; Fatah, Aziz Hama-Raheem; Hussain, Adil Mohammed title: The Elastic and Inelastic Electron-Nucleus Scattering Form Factors for Be9 Nucleus date: 2020-08-17 words: 4940 flesch: 72 summary: Moreover, the elastic form factor is occurring when J = 0 (zero spin) and is obtainable from the simple form of the Fourier transform as [22]: F q Z r j qr r dr0 0 0 0 24( ) = ( ) ( ) ∞ ∫ π ρ� � � � � (10) Where, F 0 (q) is the ground-state form factor, r is the radius of the nucleus, and ρ 0 (r) is the charge density. The comparison has been done between the theoretical calculations of Coulomb form factors by MSDI interaction, realistic M3Y interaction, and the experimental results that measured by other workers, it noticed that the Coulomb form factors for the (M3Y) interaction gave a reasonable depiction of the measured data. keywords: coulomb; electron; factors; form; scattering; state; vol cache: uhdjst-739.pdf plain text: uhdjst-739.txt item: #56 of 91 id: uhdjst-741 author: Abbas, Haidar Abdulrahman; Ghafoor, Kayhan Zrar title: Enabling Accurate Indoor Localization Using a Machine Learning Algorithm date: 2020-06-27 words: 4374 flesch: 52 summary: The investigation of indoor localization methods utilizing signals has increased widely [5]. Thus, fingerprinting localizations can utilize RSS data to minimize the notable amount of time and energy. keywords: accuracy; algorithms; bayes; learning; localization; machine; phone; positioning; rss; svm cache: uhdjst-741.pdf plain text: uhdjst-741.txt item: #57 of 91 id: uhdjst-745 author: H. Karim, Raz Muhammad; Salh, Samira Muhamad title: Using Tobit Model for Studying Factors Affecting Blood Pressure in Patients with Renal Failure date: 2020-07-01 words: 6178 flesch: 64 summary: The descriptive statistics give an overview of working with the minimum, maximum, mean, and median of (Age, blood urea, BMI, Waist Circumference), and the results are 18, TABLE 2: Descriptive statistics of dependent and independent variables in the study Blood pressure (Y) Min Max Mean Median 46.15 146.67 82.25 100.00 Age (X1) 18.00 87.00 51.39 49.00 Blood urea (X2) 17.40 404.00 118.86 117.00 BMI (X3) 13.84 42.97 25.46 23.44 Waist circumference (X4) 30.0 150.0 68.4 60.0 TABLE 3: Results of censored regression model: censored (formula=Y~X, left=0, right=Infinity, data=my data) Coefficients Estimate Std. The results of analysis censored regression model in Table 3 show the final result with all significant variables for the phenomenon study, the results of parameter estimation and t value analysis, the significant factors affecting BP. keywords: blood; data; model; regression; tobit; variable; vol cache: uhdjst-745.pdf plain text: uhdjst-745.txt item: #58 of 91 id: uhdjst-750 author: Al-Ani, Muzhir Shaban; Al-Ani, Dimah Mezher title: Review Study on Sciencedirect Library Based on Coronavirus Covid-19: covid-19 study date: 2020-08-06 words: 11660 flesch: 81 summary: The most common symptoms of COVID-19 disease are fever, fatigue, and dry cough. “The role of afferent pulmonary innervation in poor prognosis of acute respiratory distress syndrome in COVID-19 patients and proposed use of resiniferatoxin (RTX) to improve patient outcomes in advanced disease state: A review”. keywords: c o; c ol; covid-19; e t; ed c; ed d; ed ic; journal; m ed; s c; vol cache: uhdjst-750.pdf plain text: uhdjst-750.txt item: #59 of 91 id: uhdjst-760 author: Hamaamin, Yaseen Ahmed; Abdullah, Jwan Bahadeen title: Temporal Variation of Drinking Water Quality Parameters for Sulaimani City, Kurdistan Region, Iraq date: 2020-11-05 words: 5492 flesch: 64 summary: Water quality can be defined in terms of its chemical, physical, and biological characteristics which show the suitability of water for different uses such as drinking, industrial, agricultural, and domestic. The results of physical and chemical parameters of collected water samples were compared with the World Health Organization and Iraqi standards for drinking water quality. keywords: city; drinking; dukan; quality; sarchnar; sulaimani; water cache: uhdjst-760.pdf plain text: uhdjst-760.txt item: #60 of 91 id: uhdjst-762 author: Mohammed, Shaniar Tahir; Hussien, Jamal Ali title: A Traceable and Reliable Electronic Supply Chain System Based on Blockchain Technology date: 2020-12-14 words: 5175 flesch: 57 summary: In this section, we propose an ESC model, which enables traceability, reliability, monitoring of drug transactions in the Iraqi Kurdistan based on the BC technology. In this paper, BC technology is used to create a reliable architecture for the ESC process and solves the problem of supply chain systems, such as reliability and traceability. keywords: block; blockchain; chain; drug; esc; information; supply; system; technology; transactions cache: uhdjst-762.pdf plain text: uhdjst-762.txt item: #61 of 91 id: uhdjst-764 author: Kakahama, Hemin Kamal; Taha, Miran title: Adaptive Software-defined Network Controller for Multipath Routing based on Reduction of Time date: 2020-11-15 words: 6623 flesch: 58 summary: In this paper, we propose an efficient algorithm for SDN multipath routing controller. [9]. In this paper, we propose an algorithm for SDN controller which based on using adaptive packet to calculate multipath routing. keywords: algorithm; controller; cost; link; mechanism; multipath; network; packet; path; routing; sdn; software; time; video cache: uhdjst-764.pdf plain text: uhdjst-764.txt item: #62 of 91 id: uhdjst-770 author: Abdulla, Raz Sirwan; Hama, Salih Ahmed title: Serological and Molecular Detection of Hepatitis B virus among patients referred to Kurdistan Center for Hepatology and Gastroenterology in Sulaimani City/Kurdistan Region of Iraq date: 2020-11-26 words: 4638 flesch: 59 summary: The absence of HBsAg and detection of anti-HBsAg among HBV patients can be considered a sign of recovery from the disease, whereas if HBV DNA is still detected during this stage, this could be an indicator for chronic infection [4]. “Correlation of quantitative assay of HBsAg and hepatitis B virus DNA levels among chronic HBV patients attending pathologist lancet laboratory in Nairobi, Kenya”. keywords: detection; dna; hbsag; hbv; hepatitis; infection; patients; results; virus; vol cache: uhdjst-770.pdf plain text: uhdjst-770.txt item: #63 of 91 id: uhdjst-775 author: Gharib, Kani Namiq; Mustafa, Nawbahar Faraj; Rashid, Haveen Muhammed title: Urban Rainwater Harvesting Assessment in Sulaimani Heights District, Sulaimani City, KRG, Iraq date: 2021-04-27 words: 4477 flesch: 62 summary: “The role of domestic rainwater harvesting systems in storm water runoff mitigation”. Water Demand To determine domestic water demand for indoor and outdoor household purposes, the standard average daily water demand per capita (Sulaimani water supply directorate) which is (250 l/capita/day) is used to calculate the average monthly demand for the study area keywords: area; demand; harvesting; method; rainwater; runoff; scs; study; sulaimani; swmm; vol; water cache: uhdjst-775.pdf plain text: uhdjst-775.txt item: #64 of 91 id: uhdjst-780 author: Salih, Shalaw Faraj; Abdulla, Alan Anwer title: An Improved Content Based Image Retrieval Technique by Exploiting Bi-layer Concept date: 2021-01-05 words: 7012 flesch: 62 summary: Image features can be classified into two types: Local features and global features. In 2009, Lin et al. proposed a CBIR technique depending on extracting three types of image features [12]. keywords: cbir; color; content; features; image; image retrieval; precision; proposed; query; retrieval; technique; texture; vol cache: uhdjst-780.pdf plain text: uhdjst-780.txt item: #65 of 91 id: uhdjst-785 author: Muhammed, Brzu T.; Awlla, Ardalan Husin; Murad, Sherko H.; Ahmad, Sabah N. title: Prediction of CoVid-19 mortality in Iraq-Kurdistan by using Machine learning date: 2021-05-23 words: 2927 flesch: 58 summary: Using ML algorithm provided us to find mortality rate of this disease, and detect which factor has major effect to patient death. The models forecast when COVID-19 infected patients would be death or recovered. keywords: algorithm; classification; coronavirus; covid-19; dataset; patient; science; vol cache: uhdjst-785.pdf plain text: uhdjst-785.txt item: #66 of 91 id: uhdjst-791 author: Salih, Fawzi Abdul Azeez; Abdulla, Alan Anwer title: An Efficient Two-layer based Technique for Content-based Image Retrieval date: 2021-04-05 words: 8277 flesch: 64 summary: “Quality improvement for exemplar- based image inpainting using a modified searching mechanism”. Color is extremely used feature for image retrieval techniques [35], [36]. Fig. keywords: approach; cbir; color; features; image; journal; layer; lbp; precision; rate; retrieval; technique; vol cache: uhdjst-791.pdf plain text: uhdjst-791.txt item: #67 of 91 id: uhdjst-792 author: Ahmed, Ari Mohammed ali; Mohammed, Aree Ali title: A State-of-the-Art Review on Machine Learning-based Methods for Prostate Cancer Diagnosis date: 2021-03-31 words: 4435 flesch: 59 summary: Physicists have concentrated on continuous advancement in imaging methods over the past decades, enabling radiologists to improve cancer detection and diagnosis. “Recent advancement in cancer detection using machine learning: Systematic survey of decades, comparisons and challenges”. keywords: accuracy; cancer; classification; diagnosis; learning; model; pca; prostate; vol cache: uhdjst-792.pdf plain text: uhdjst-792.txt item: #68 of 91 id: uhdjst-794 author: Tofiq, Tofiq Ahmed; Hussein, Jamal Ali title: Kurdish Text Segmentation using Projection-Based Approaches date: 2021-05-16 words: 6173 flesch: 62 summary: Word/Sub-word Segmentation After the line segmentation stage, the subsequent stage is word segmentation. “Off-line arabic handwriting character recognition using word segmentation”. keywords: algorithm; arabic; character; font; kurdish; line; projection; segmentation; sub; text; vol; word cache: uhdjst-794.pdf plain text: uhdjst-794.txt item: #69 of 91 id: uhdjst-8 author: Abduljabbar, Heamn Noori; Perxdr, Sardar Yaba title: Advanced Methods for Detecting Pelviureteric Junction Dilatation by Two Dimensional Ultrasound date: 2017-04-12 words: 2818 flesch: 59 summary: Different types of filters (HE, ADH, CLAHE, and Wiener) used to enhance 2D ultrasound images of (4) abnormal kidneys making image enhancement. that in this study after saving 2D ultrasound images, different types of filters used to enhance those images, and improve its quality to be easier for diagnosis four different abnormal images of PUJ dilatation selected from all the patients who scanned, each case with different level of dilation from mild to moderate and sever. REFERENCES [1] J. R. Lindner, J. Song, F. Xu, A. L. Klibanov, K. Singbartl, K. Ley and S. Kaul. keywords: dilatation; image; journal; puj; renal; ultrasound; vol cache: uhdjst-8.pdf plain text: uhdjst-8.txt item: #70 of 91 id: uhdjst-806 author: Faraj, Azhi Abdalmohammed; Mahmud, Didam Ahmed; Rashid, Bilal Najmaddin title: Comparison of Different Ensemble Methods in Credit Card Default Prediction date: 2021-07-19 words: 4159 flesch: 57 summary: This is done on both the original skewed dataset and then on balanced dataset several studies have showed the superiority of neural networks as compared to traditional machine learning algorithms, the results of our study show that ensemble methods consistently outperform Neural Networks and other machine learning algorithms in terms of F1 score and area under receiver operating characteristic curve regardless of balancing the dataset or ignoring the imbalance Index Terms: Ensemble methods, Credit card default prediction, Balanced and imbalanced dataset, Stacking and XGBoosting, Neural networks  Corresponding author’s e-mail: Azhi Abdalmohammed Faraj, Department of Information Technology, College of Commerce, University of Sulaimani, Sulaimani, Iraq/Department of Computer Engineering, College of Engineering, Dokuz Eylül Üniversitesi, İzmir, Turkey. The strategies of the ensemble Faraj, et al.: Credit card default prediction 22 UHD Journal of Science and Technology | Jul 2021 | Vol 5 | Issue 2 exploit the influence of “the wisdom of crowds,” which is focused on the idea that a community’s collective judgment is more powerful than any person in the group. keywords: credit; dataset; default; ensemble; learning; methods; scoring; vol cache: uhdjst-806.pdf plain text: uhdjst-806.txt item: #71 of 91 id: uhdjst-811 author: Abdulrahman, Yadgar Sirwan title: Network Intrusion Detection using a Combination of Fuzzy Clustering and Ant Colony Algorithm: English date: 2021-07-16 words: 6484 flesch: 63 summary: “Data mining approaches for network intrusion detection: From dimensionality reduction to misuse and anomaly detection”. And False Alarm has been used in Chitrakar and Chuanhe [2], to detect network intrusion, the combined method of K-means clustering with Naive Bayes classification with the same working criteria and the same dataset (Kyoto 2006+ dataset) has been used. keywords: algorithm; ant; attack; clustering; colony; dataset; detection; function; intrusion; kdd; means; method; network; vol cache: uhdjst-811.pdf plain text: uhdjst-811.txt item: #72 of 91 id: uhdjst-817 author: Rasheed, Mariwan Ahmed; Mohammad, Khalid K. title: The Luminosity Function of Galaxies in Some Nearby Clusters date: 2021-07-03 words: 5730 flesch: 83 summary: Many studies have thus been devoted to the LF of cluster galaxies to discover the influence of environment on their evolution. | Vol 5 | Issue 2 The LF of cluster galaxies has been compared to that of field galaxies through several studies. keywords: band; function; galaxies; luminosity; vol cache: uhdjst-817.pdf plain text: uhdjst-817.txt item: #73 of 91 id: uhdjst-879 author: Teimoor, Ramyar Abdulrahman title: A Review of Database Security Concepts, Risks, and Problems date: 2021-10-10 words: 6000 flesch: 50 summary: The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed. keywords: access; attacks; authentication; control; database; database security; information; journal; protection; risks; science; security; technology; user; vol cache: uhdjst-879.pdf plain text: uhdjst-879.txt item: #74 of 91 id: uhdjst-880 author: Abdulhadi, Hezha M.Tareq; Talabani, Hardi Sabah title: Comparative Study of Supervised Machine Learning Algorithms on Thoracic Surgery Patients based on Ranker Feature Algorithms date: 2021-12-15 words: 5689 flesch: 59 summary: Then, two ranker feature selections, information gain and gain ratio, were used on the thoracic surgery dataset to examine and explore the effect of used ranker feature selections on the machine learning classifiers. “An improved short term load forecasting with ranker based feature selection technique”. keywords: accuracy; algorithms; classification; data; dataset; feature; learning; machine; performance; ranker cache: uhdjst-880.pdf plain text: uhdjst-880.txt item: #75 of 91 id: uhdjst-894 author: Kaka alla, Kaziwa Ahmad; Hama, Salih Ahmed title: Seroprevalence and Molecular Detection of Influenza A Virus (H1N1) in Sulaimani Governorate-Iraq date: 2022-01-02 words: 4285 flesch: 59 summary: “Lung histopathology in coronavirus disease 2019 as compared with severe acute respiratory syndrome and H1N1 influenza”. “Diversity of influenza viruses in swine and the emergence of a novel human pandemic influenza A (H1N1)”. keywords: anti; h1n1; igg; igm; influenza; journal; results; virus; vol cache: uhdjst-894.pdf plain text: uhdjst-894.txt item: #76 of 91 id: uhdjst-9 author: Ismail, Haidar Jalal; Barzinjy, Azeez Abdullah Azeez; Jabbar, Kadhim Qasim title: Estimation of Nano-Pore Size Using Image Processing date: 2017-04-12 words: 3270 flesch: 62 summary: Consequently, the nanopore size of Al 2 O 3 films computed by means of SEM images. [10], size of nanopores of SEM images obtained through using morphological and Canny edge detector techniques. keywords: image; methods; segmentation; segmenting; vol cache: uhdjst-9.pdf plain text: uhdjst-9.txt item: #77 of 91 id: uhdjst-903 author: Kaka Muhammad, Tara Qadir; Sharifi, Hawar Othman; Ghareb, Mazen Ismaeel title: Eye Tracking Technique for Controlling Computer Game Objects date: 2022-04-22 words: 6236 flesch: 67 summary: Figs. 5-7 have shown the histogram for speed performance of three different method of game input eye, mouse, and eye keyboard. By testing eye input versus mouse input in three extraordinary PC games, Smith and Graham keywords: computer; eye; game; input; interaction; keyboard; mouse; performance; results; science; tracker; tracking; vol cache: uhdjst-903.pdf plain text: uhdjst-903.txt item: #78 of 91 id: uhdjst-906 author: Al-Ani, Muzhir Shaban; N. Jawad, Shawqi; Abdelal, Suha title: Knowledge Management Functions Applied in Jordanian Industrial Companies: Study the Impact of Regulatory Overload date: 2021-11-04 words: 6351 flesch: 37 summary: This weakens their position in making various decisions and makes mistakes due to the excessive overload in the aspects of knowledge information. The significance of knowledge management in business organizations is not in the knowledge itself, but in the value added to these organizations, in addition to the role it plays in transferring organizations to the knowledge economy that emphasizes investment in knowledge capital [11]. keywords: companies; environment; impact; information; knowledge; knowledge management; management; organizations; overload; study; technology cache: uhdjst-906.pdf plain text: uhdjst-906.txt item: #79 of 91 id: uhdjst-919 author: Omar, Bayan; D. Majeed, Hamsa; Hashim, Siti Zaiton Mohd; Al-Ani, Muzhir title: New Feature-level Algorithm for a Face-fingerprint Integral Multi-biometrics Identification System date: 2022-02-11 words: 5026 flesch: 54 summary: finij: fingerprint features for an individual. At the level of feature fusion, signals that come from different biometrics channels are processed first. keywords: algorithm; dis; eigen; face; feature; fingerprint; fusion; vol cache: uhdjst-919.pdf plain text: uhdjst-919.txt item: #80 of 91 id: uhdjst-922 author: Rashad, Mustafa; Hussein, Dana L.; Abdalkarim, Haval; Azeez, Ribwar title: Future IoT Software in Healthcare Also Exploring IoT Industry Application date: 2022-05-19 words: 4400 flesch: 52 summary: The previous alludes to the rules that are utilized in the advancement of a HIoT gadget, while the last option alludes to medical care applications that are utilized in either diagnosing a particular medical issue or estimating well-being measurements In medical care, the IoT has a variety of applications: Keep a nearby eye on your well-being. keywords: applications; care; framework; healthcare; hiot; information; internet; iot; medical; services; things; vol cache: uhdjst-922.pdf plain text: uhdjst-922.txt item: #81 of 91 id: uhdjst-926 author: Hameed, Safa; Ali, Alaa Badeea title: An Intelligent and Precise Method Used for Detecting Gestational Diabetes in the Early Stages date: 2022-03-20 words: 6489 flesch: 64 summary: “Algorithm for diabetes risk evaluation from past gestational diabetes data”. A type of diabetes is gestational diabetes. keywords: accuracy; classification; data; dataset; diabetes; journal; method; table; vol cache: uhdjst-926.pdf plain text: uhdjst-926.txt item: #82 of 91 id: uhdjst-938 author: Al-Ani, Muzhir Shaban; Jawad, Shawqi N.; Abdelal, Suha title: Impact of Technological Burden on Knowledge Management Functions in Jordanian Industrial Companies date: 2022-07-01 words: 6913 flesch: 45 summary: The influence of technological strain on the dimensions of knowledge management functions is shown in Table 1. Table 2 shows that the multiple regression model used to assess the impact of the dimensions of the independent variable technological burden (type of technology and technical capabilities) on the variable of knowledge management functions is significant, and that the two variables together (R2 = 38.3%) account for the majority of the differences in knowledge management function values. Research Questions This research is implemented through addressing the following questions: • According to managers, what kind of technology and what kind of technical skills do Jordanian industrial businesses have? • What do managers think about the effects of technology load on the functions of knowledge management? • Managers in Jordanian factories think about the technological load in two ways: How much technology there is and how well they can use it. keywords: burden; functions; information; journal; knowledge; knowledge management; management; research; sharing; study; technology; vol cache: uhdjst-938.pdf plain text: uhdjst-938.txt item: #83 of 91 id: uhdjst-944 author: Hama, Abdullah Ahmed; Weli, Sardar M. ; Salih, Sabiha M; Feaq, Ary B.; Ali, Fatima M. title: Determination of Potassium Bromate in Bread Brands in Sulaimani City, Kurdistan-Iraq date: 2022-05-19 words: 3080 flesch: 69 summary: Single beam UV–visible spectrophotometer APEL-303 was used for the quantification of KBrO 3 in bread samples. “Determination of potassium bromate content in selected bread samples in Gwagwalada, Abuja-Nigeria”. keywords: bread; bromate; journal; kbro; potassium; samples; study; vol cache: uhdjst-944.pdf plain text: uhdjst-944.txt item: #84 of 91 id: uhdjst-951 author: Fattah Aziz, Dlivan; Ismail Khalil, Yehia title: Newly Simple Quantitative Determination of Montelukast Sodium by Ultraviolet-Spectrophotometry date: 2022-08-15 words: 2575 flesch: 55 summary: Linearity Calibration curve for standard MTK solution was obtained in range from 2.5 µg mL−1 to 50 µg mL−1 for MTK. Stability Stability of MTK solution of calibration was determined at room temperature in day light condition for a period of 24 h by observing change in absorbance at the same wavelength. keywords: determination; method; montelukast; mtk; sodium; solution; vol cache: uhdjst-951.pdf plain text: uhdjst-951.txt item: #85 of 91 id: uhdjst-958 author: Khalil Sharif, Halo; Hama Ali. A. Faraj, Kamaran title: Semantic Web Recommender System over Different Operating Platforms date: 2022-08-10 words: 3953 flesch: 53 summary: The ontology modified from only one parameter to two parameters in propose of Semantic Web Recommender System over Different Operating Platforms Halo Khalil Sharif, Kamaran Hama Ali. A. Faraj: Semantic Web Recommender System 20 UHD Journal of Science and Technology | July 2022 | Vol 6 | Issue 2 the system. keywords: content; data; dataset; movie; operating; recommender; semantic; swrs; system; vol; web cache: uhdjst-958.pdf plain text: uhdjst-958.txt item: #86 of 91 id: uhdjst-968 author: Hussein, Lana Sardar; Mahmood, Sozan Abdulla title: Kurdish Speech to Text Recognition System Based on Deep Convolutional-recurrent Neural Networks date: 2022-11-18 words: 5721 flesch: 62 summary: There are extremely few research papers on Kurdish speech recognition. The first attempts for Kurdish speech recognition in [7] which presents a dataset extracted (BD-4SK-ASR) from Sorani Kurdish texts from grades one to three of primary school in Iraq’s Kurdistan Region, which contains 200 sentences. keywords: accuracy; cnn; data; dataset; kurdish; model; recognition; science; size; speech; words;   cache: uhdjst-968.pdf plain text: uhdjst-968.txt item: #87 of 91 id: uhdjst-982 author: D. Majeed, Hamsa; Saman Nariman, Goran title: Offline Handwritten English Alphabet Recognition (OHEAR) date: 2022-08-20 words: 6591 flesch: 57 summary: Independent component analysis (ICA) technique is used in feature extraction phase. Feature extracted process of OHEAR. keywords: chain; dataset; english; extraction; feature; handwritten; image; letter; model; process; recognition; vol cache: uhdjst-982.pdf plain text: uhdjst-982.txt item: #88 of 91 id: uhdjst-988 author: Hamaamin, Rebin Abdulkareem; Wady, Shakhawan Hares; Sangawi, Ali Wahab Kareem title: COVID-19 Classification based on Neutrosophic Set Transfer Learning Approach date: 2022-08-01 words: 5261 flesch: 57 summary: Therefore, this scenario was considered as a potential classification method for COVID-19 CXR images. 3. Convert image from Spatial domain to NS domain: (a) Original Image (COVID-19), (b) F-domain of COVID-19 image, (c) I-domain of COVID-19 image, and (d) T -domain of COVID-19 image. keywords: covid-19; cxr; domain; epoch; images; learning; vol cache: uhdjst-988.pdf plain text: uhdjst-988.txt item: #89 of 91 id: uhdjst-992 author: Rasul, Hezhan Faeq; Muhammed, Sirwan Muhsin ; Arif , Hunar Hiwa ; Jalal , Paywast Jamal title: Molecular detection of Enterotoxigenic Escherichia coli Toxins and Colonization Factors from Diarrheic Children in Pediatric Teaching Hospital, Sulaymaniyah, Iraq date: 2022-09-22 words: 6555 flesch: 62 summary: Genetic diversity of heat- labile toxin expressed by enterotoxigenic Escherichia coli strains isolated from humans. [54] M. Paredes-Paredes, P. C. Okhuysen, J. Flores, J. A Mohamed, R. S Padda, A. Gonzalez-Estrada, et al. Seasonality of diarrheagenic Escherichia coli pathotypes in the US students acquiring diarrhea in Mexico. keywords: children; coli; colonization; enterotoxigenic; escherichia; escherichia coli; etec; isolates; journal; microbiology; vol cache: uhdjst-992.pdf plain text: uhdjst-992.txt item: #90 of 91 id: uhdjst-994 author: Abdalla, Rawand Raouf; Jumaa, Alaa Khalil title: Log File Analysis Based on Machine Learning: A Survey: Survey date: 2022-10-07 words: 5816 flesch: 54 summary: Log File and Machine Learning 80 UHD Journal of Science and Technology | July 2022 | Vol 6 | Issue 2 4. LOG MINING Log mining is a technique which employs statistics, data mining, and ML to automatically explore and analyze vast amounts of log data in essence to find useful patterns and trends. There are predictive analytic systems that utilize log data to assist with marketing plan development, advertising placement, and inventory management. keywords: analysis; data; detection; file; information; journal; learning; log; logs; mining; security; system; user; vol; web cache: uhdjst-994.pdf plain text: uhdjst-994.txt item: #91 of 91 id: uhdjst-995 author: Rasul, Hakar Mohammed; Jumaa, Alaa Khalil title: Real-Time Twitter Data Analysis: A Survey date: 2022-12-21 words: 7132 flesch: 57 summary: As a result, the portion that follows in this essay will examine similar efforts on Twitter data analysis employing Apache Spark and bot identification, as well as the available tools. 2. BACKGROUND INFORMATION 2.1. Finally, the last phase was considering the journal’s indexing and if they are peer reviewed or not. 4. SURVEY METHODOLOGY When coming to Twitter data analysis, there are various types of analysis that might be done on the collected data such as sentiment analysis, tweets classification, and fake tweets detection. keywords: analysis; bot; bots; classification; data; deep; detection; human; learning; model; sentiment; tweets; twitter; twitter data; users; vol cache: uhdjst-995.pdf plain text: uhdjst-995.txt