C.V
أساليب النشر العلمي في المجلات العالمية
Nanotechnology Application
Book , Programs
With faculty Team
Head Of Department
Rapporteur of Computer Science Department
Networking Department & Business Administration Department
Where it has been explained about Both Scopus and ISI index academic journals, books, and conference proceedings. However, Scopus covers a broader range of subjects, and it indexes more journals than ISI. Scopus also indexes more conference proceedings and offers advanced search features that make it easier to search for and locate relevant research. In summary, Scopus and ISI are two widely used citation databases that offer a range of services to researchers. While ISI is best known for its calculation of the journal impact factor, Scopus offers a more comprehensive citation database that covers a broader range of subjects and indexes more journals. Both Scopus and ISI offer citation analysis and indexing of academic research, but Scopus provides more metrics and features, which makes it a more complete research tool. However, Scopus is also more expensive than ISI, which makes it less accessible for smaller institutions or individual researchers.At the end of the symposium, a set of questions and answers were raised on this subject
Using transprtiation appliction for cihan university -Duhok
Using Arduino Paltform for diffrence types of application
Mobile Programming
Mobile generation
Editi staff accounts and modified
Certificate
Managing Interconnected device
.NET
English Language
Using All G-Suite
The Fluidized bed, a multi-phase innovation, makes a difference in useful contact in the midst of them, consequently, it is broadly utilized within the drying of vegetables, drug store businesses, chemical exchange, metallurgy, oil and in generating warm control. In fluidized bed forms, the strong and gas collaboration and responses in the midst of chemicals create sufficient factors which ought to be overseen, making the method exceptionally convoluted. Subsequently, to expect and assess diverse forms fluidized bed modeling and simulation are utilized all around. The prime intent of this think isn't as it were to conclude, but too to analyze and hone diverse parameters like Speed, discuss Temperature and Volume stream rateto accomplish the ideal drying rate in a fluidized bed dryer. A warming weapon with unstable temperatures is utilized to warm the air from the discuss blower, which encompasses an arrangement to switch between seven diverse speeds of discuss. The volume stream rate of the blower is consistent, i.e. 3.3 m3/min. The temperature of the discuss information (at both the entrance and exit of the drying chamber) is compared by employing a bland K-type thermocouple with 2 tests on an advanced show. What comes about, particularly the greatest drying rate is at that point approved to get the ideal values of the discuss speed, temperature, weight drop along the drying chamber and amount of dryable. The optimization of the specified parameters will be done utilizing one of the different optimization procedures accessible
Cutting-edge technologies focusing on optical efficiency, data rates, and transmission power efficiency are propelling the evolution of multiple-input-multiple-output (MIMO) systems. These innovations facilitate higher aggregation rates, particularly beneficial in large MIMO generation environments. However, the fixed nature of MIMO results in a smaller channel shape in the spatial domain, limiting dynamic adoption in various 2D channels. Despite this constraint, the distinctive channel characteristics of MIMO present opportunities for significant improvements in 5G network capacity. This study explores and compares the channel nature of MIMO, shedding light on its potential to optimize network performance in heterogeneous environments, marking a noteworthy stride in the pursuit of enhanced wireless communication technologies
Business analytics is also used to gather feedback from customers and according to that feedback, services can be improved. Data analytics also helps to convert text into data which will help to get review sentiment score. This is used to convert textual feedbacks into numbers with the analysis of positive and negative keywords. The more your assumption score isthe way better trade you're running. Numerous worldwide lodgings, aircrafts, and railroad are moreover utilizing information analytics for setting great costs and overseeing their income. It gives an in-depth audit of different applications of Trade Analytics utilized by tourism companies, and challenges related with the utilization of Trade Analytics by tourism companies. The major finding of the ponder is that Commerce Analytics has control to construct the corporate picture of the travel companies, through client engagement, brand situating, customized arrangements and through advertise division. Dim side of theTrade Analytics utilization, makes a difference in surrounding techniques which can kill the burden caused to tourism clientsalongsideharvesting greatest benefits from Commerce Analytics applications
With the advancement of technology, the telephone network has become the primary mode of communication worldwide, and private businesses have increased their reliance on telephone communication. Many organizations choose to establish their own service in order to manage internal calls. Voice over Internet Protocol (VoIP) is one of the emerging technologies that may provide low-cost service with high-quality and availability. VOIP technology enables the transfer of multimedia data such as audio and video. While some VoIP services require a computer or a dedicated VoIP phone, others allow you to make VoIP calls using your landline phone via a special adaptor. Rather than using a traditional private branch exchange (PBX), we used a Raspberry pi, which is a set of credit card-sized single-board computers, as a server for handling voice and video call communications over a wired or wireless LAN network while monitoring the entire system. Wireshark is a software application that is used to capture packets in a network and present information about certain packets in as much detail as possible.
With the increase in the growth of the Internet, web applications such as net banking, online shopping, social networking and email communications have become central and essential part of our everyday life. Web pages are no longer static; they contain dynamic content from diverse sources that may be trusted or untrusted. Providing a good security for the web application and its user becomes hard, expensive, time consuming and quite confusing. However, mitigating the attacks to secure the web application has become very essential and one of the primary liability of the web developers and researchers. Securing the web applications becomes paramount and it is an intricate process with the current technologies since they are very complex to understand, implement and maintain. Thus, the main goal of this research is to reduce the attack by minimizing the amount of time needed to create and maintain the approach. A model named “Dual Delegation Model” to protect the web applications from session attacks has been implemented on client-side and on the server-side. This DDM could be added to the client and server as delegates, does the security checks, and manage the sessions by monitoring the communications between client and the server. Keywords: Web Application, Security, Dual Delegation Model, Accuracy
Attacks over the internet have become an increasing menace in recent time which tries to hack or illegally tamper with the data available over the networks. On the other hand, there has been an increase in volume in research contributions to effectively counter attack these attacks and implement a strong defence mechanism. There have been numerous algorithms and frameworks implemented in recent times which are intelligent and soft computing based. These evolution based algorithms play a vital role in self adapting the system under attack towards increasing and new types of attacks which are increasing day by day. One such area of soft computing algorithms investigated in this chapter is the artificial neural network or popularly known as ANNs. They work analogous to the biological neurons in the human body. The chapter is organized in a systematic manner to give an insight in to ANN based network models to counter attack DDoS attacks which has been the primary focus of this thesis, architecture and implementation of ANNs, the experimental investigations and findings which help in drawing an inference of ANN based defence models. Key words: Network attacks, distributed denial of service attacks, ANN, training and confusion matrix.
International conference on computing ,Engineering and Technologies (ICCET 2019) in July 8, 2019
Social Link
LinkedIn
Google Scholar
Scopus
ORCID
Research Gate
Web of Science
Cihan University - Duhok Website