{"title":"Backend as a Service Cloud Computing Integrated with Cross-platform Mobile Development Framework to Create an E-learning application that works in Mobile and Web with a single codebase","authors":"Osama mohammed ahmed","doi":"10.24086/cocos2022/paper.511","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.511","url":null,"abstract":"Many platforms are emerging recently and businesses need to work with all of them, therefore, creating applications that work on multiplatform like Android, IOS, Windows …etc. is necessary these days.Building a separate native application for each platform as well as working separately with both Frontend and Backend is costly in several respects, including time, effort and cost.using Cross-platform tools and frameworks is the best solution to the problem of multiple platforms and the need to deal with all of them. This paper discusses the most famous, modern, and widely used Cross-platform tools to introduce the best way to build an E-learning application that works natively in multiplatform using only one programming language, and even it doesn’t require work with the Backend side. Finally, we have created a sample E-learning application using Flutter with Firebase as a Backend. Due to the Corona pandemic, e-learning has become a mandatory requirement as a primary or secondary method of education, this application work on all platforms (Mobile and Desktop), and we tested it on Android and Web Browsers.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125183077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diagnosis of Parkinson's disease through EEG signals based on artificial neural network and cuckoo search algorithm","authors":"Rzgar Sirwan Raza, Adil Hussein Mohammed","doi":"10.24086/cocos2022/paper.698","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.698","url":null,"abstract":"Parkinson's disease is a degenerative nervous system condition that impairs mobility. If the condition is not detected early enough, it might have permanent effects for the sufferer. A novel approach for identifying Parkinson's disease is provided in this research, which employs machine optimization and learning techniques. The suggested method's diagnosis procedure may be broken down into three primary steps: \"preprocessing,\" \"feature extraction,\" and \"classification.\" Preprocessing the EEG data is the initial stage in the suggested technique. Database samples are treated using discrete wavelet analysis to remove the destructive influence of noise on the input signals using signal analysis for this aim. The suggested method's second phase will employ principal component analysis to remove duplicate features and minimize data dimensionality. The artificial neural network model is trained and the classification model is built using the retrieved features. The effectiveness of the suggested technique is examined in terms of criteria such as accuracy, sensitivity, and specificity during the experimentation phase, and the results are compared to existing learning models. The findings revealed that the suggested technique enhances illness diagnostic accuracy by at least 8.25% and may be utilized as a useful tool in disease diagnosis.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seismic low-frequency shadow detection based on the Levenberg-Marquardt reassignment operators using S-transforms","authors":"R. Anvari, Adil Hussein Mohammed, S. Rashidi","doi":"10.24086/cocos2022/paper.632","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.632","url":null,"abstract":"Based on the phenomenon of low-frequency shadow beneath the oil and gas reservoirs, there is much theoretical research and practical production data. Therefore, accurate detection of the low-frequency shadow in order to predict reservoir. The high-precision detection time-frequency transform in this paper is achieved by adding Levenberg-Marquardt reassignment operators using S-transforms to adjust the window width adaptively according to the characteristics of different signal components. Finally, it optimizes the time-frequency distribution. Simulation results show that this method has a better time-frequency concentration than conventional methods. Finally, an application of this method in detecting low-frequency shadow verifies the effectiveness and feasibility, which provides a high-precision tool and means for reservoir prediction.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama, ,. H. Hashim Ibrahim
{"title":"Machine Learning Approaches to Enable Resource Forecasting Process of Road Tunnels Construction","authors":"A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama, ,. H. Hashim Ibrahim","doi":"10.24086/cocos2022/paper.718","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.718","url":null,"abstract":"Increasing demand for tunneling projects, increases attention to time and cost required for their construction. Most of parameters which are affecting on the time and cost of tunnel construction are unknown. The purpose of this paper is to provide a method to predict the construction time and cost of a road tunnelusing linear regression (LR) method. In order to train the LR method, some datasets are obtained from the historical road tunnels. To verify the feasibility of the proposed method, it has been applied to a road tunnel. All of the forecasted results have been compared with the actual results obtained during the tunnel construction and the accuracy of the predictions has been investigated. According to three statistical evaluation criteria of root mean square error (RMSE), mean absolute percentage error (MAPE) and determination of the coefficient (R2), a very high accuracy has been obtained in the prediction results. The RMSE, MAPE and R2 indices have been calculated as 0.0005 days, 0.9380637% and 0.9874 for the construction time, respectively; and 7.1194 US$,0.78891593% and 0.9873 for the construction cost, respectively.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131406735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdullah A. Nahi, Laith R. Flaih, K. Jasim, Rajan Hossian
{"title":"Review of IoT and Robotics application (Special case Study in Iraq and Kurdistan Region)","authors":"Abdullah A. Nahi, Laith R. Flaih, K. Jasim, Rajan Hossian","doi":"10.24086/cocos2022/paper.510","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.510","url":null,"abstract":"Currently, IoT (web of things) applications ending up being trending in all around the world and also yet also in the inadequate income nations there is some applications related to IoT at least in colleges to study, so a lot of the academic individuals and federal governments are aware of it is advantages to the area as well as teaching to create a generation that can handle modern technology systems as well as obtain benefits from it to decrease the use of power and also save the setting, this paper will certainly go over the trends application in Iraq as well as the feasible technologies and also possibilities in the near future.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rojiar Pir Mohammadiani, Maryam Mozaffari, Soma Solaiman Zadeh
{"title":"Unsupervised Feature Selection Method based on Structural Particularity of Minimum Spanning Tree","authors":"Rojiar Pir Mohammadiani, Maryam Mozaffari, Soma Solaiman Zadeh","doi":"10.24086/cocos2022/paper.828","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.828","url":null,"abstract":"Unsupervised Feature Selection (UFS) methods try to extract features that can well keep the intrinsic structure of data. To make full use of such information in this paper we use one of the simplest graph sparsification strategies MST (Minimum Spanning Tree) for the task of UFS. A novel graph structural information method is proposed for unsupervised feature selection, we simplify and preserve correlation between features via MST through a structure that simultaneously captures the local and global structure of data, and then use graph structural information directly to achieve the subset representative features with minimum redundancy and more discriminative power. To show the effectiveness of our method, some of the most representative and referenced UFS methods are used for conducting experiments on some benchmark datasets. Experimental results verify that the proposed feature subset selection algorithm is effective, more specifically at the running time.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The relationships for some topological structures via fuzzy, soft ,and fuzzy soft sets","authors":"S. Saleh, Mohammed Hussein Shukur, A. Al-Salemi","doi":"10.24086/cocos2022/paper.713","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.713","url":null,"abstract":"It is known that there are some mathematical tools for dealing with many uncertain problems some of them are fuzzy set[31], soft set[22], and fuzzy soft set theories which have been applied in many real-life fields such as decision making, data analysis, simulation, rule mining, evaluation of sound quality, and medical diagnosis (see [5,8,11,12,13,15,16,19,25,29,33] ).","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127180384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Source Code Plagiarism Detection System","authors":"","doi":"10.24086/cocos2022/paper.732","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.732","url":null,"abstract":"Plagiarism Detection Systems are particularly useful in identifying plagiarism in the educational sector, where scientific publications and articles are common. Plagiarism occurs when someone replicates a piece of work without permission or citation from the original creator. Because of the advancement of communication and information technologies (ICT) and the accessibility of scientific materials on the internet, plagiarism detection has become a top priority and due to the broad availability of freeware text editors, detecting source code plagiarism has become a big difficulty. There have already been several research on the many forms of plagiarism detection algorithms used in identification systems, as well as source code plagiarism detection. This work suggests a strategy that combines TF-IDF transformations with a Random Forest Classifier to achieve a 93.5 percent accuracy rate, which is high when compared to previous strategies. The suggested system is implemented using the Python programming language.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"YOLO-V3 Based Real-time Drone Detection Algorithm","authors":"Hamid R. Alsanad, Amin Z sadik","doi":"10.24086/cocos2022/paper.502","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.502","url":null,"abstract":"Drones are currently being used in a wide range of useful tasks that are too dangerous or/and expensive to be performed by humans. However, this is increasingly developing security breaching issues due to the possibility of misuse of unmanned aircraft in illegal activities such as drug smuggling, terrorism etc. Thus,thedetection and tracking of dronesare becoming a crucial topic. Unfortunately, due to the drone’s small size, its’ detection methods are generally unreliable: high false alarm rate, low accuracy rate and low detection speed are well-known aspects of this detection. The newemerging real-time algorithm based on the improved “You Only Look Once - version 3” (YOLO-V3) algorithm is proposed here for drone detection. This newly designed algorithm is consisting of three phases and has shown the potential to outperform the traditional detection approaches. The newly designed algorithm is trained and evaluated on the designed drone dataset. The evaluation results of our algorithm obtain 96% on average precision and 95.6% on accuracy.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Mamoon Alkababji, Mustafa Haitham Alhabib, Mustafa Zuhaer Al-Dabagh
{"title":"Face spoofing detection and Authentication Using Linear Binary Patterns, Gabor Features and Support Vector Machine","authors":"Ahmed Mamoon Alkababji, Mustafa Haitham Alhabib, Mustafa Zuhaer Al-Dabagh","doi":"10.24086/cocos2022/paper.819","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.819","url":null,"abstract":"Face detection and authentication have become an active field of research material in recent years duo to the increased use of face dependent access control systems, which can be considered as a good alternative to other biometric features such as fingerprint duo to its easily accessible, non- intrusive nature that makes it very important during the ongoing pandemic years. However, this method doesn’t come without security risks related to adversaries seeking to gain unauthorized access to the system. Face spoofing is a security breach attempt occurs when the attacker tries to deceive the face-enabled access control system by displaying a photo, video or wearing a mask of an authorized person to gain access. The paper in hand suggests a method for face anti-spoofing by utilizing some of the well-known feature extraction techniques usually associated with face detection and recognition, namely the LBP and Gabor features, in addition to the commonly used SVM classifier for identifying real and spoofed feces. The algorithm is implemented successfully on multiple individuals, achieving performance levels comparable to other accredited methods in terms of FAR, FRR and HTER verification criteria, aspiring for more advancedand effective methods.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}