Z. Ageed, Subhi R. M. Zeebaree, M. A. Sadeeq, S. F. Kak, Z. Rashid, A. Salih, Wafaa M. Abdullah
{"title":"A Survey of Data Mining Implementation in Smart City Applications","authors":"Z. Ageed, Subhi R. M. Zeebaree, M. A. Sadeeq, S. F. Kak, Z. Rashid, A. Salih, Wafaa M. Abdullah","doi":"10.48161/QAJ.V1N2A52","DOIUrl":"https://doi.org/10.48161/QAJ.V1N2A52","url":null,"abstract":"Many policymakers envisage using a community model and Big Data technology to achieve the sustainability demanded by intelligent city components and raise living standards. Smart cities use different technology to make their residents more successful in their health, housing, electricity, learning, and water supplies. This involves reducing prices and the utilization of resources and communicating more effectively and creatively for our employees. Extensive data analysis is a comparatively modern technology that is capable of expanding intelligent urban facilities. Digital extraction has resulted in the processing of large volumes of data that can be used in several valuable areas since digitalization is an essential part of daily life. In many businesses and utility domains, including the intelligent urban domain, successful exploitation and multiple data use is critical. This paper examines how big data can be used for more innovative societies. It explores the possibilities, challenges, and benefits of applying big data systems in intelligent cities and compares and contrasts different intelligent cities and big data ideas. It also seeks to define criteria for the creation of big data applications for innovative city services.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Applications based on SVM Classification A Review","authors":"D. M. Abdullah, A. Abdulazeez","doi":"10.48161/QAJ.V1N2A50","DOIUrl":"https://doi.org/10.48161/QAJ.V1N2A50","url":null,"abstract":"Extending technologies and data development culminated in the need for quicker and more reliable processing of massive data sets. Machine Learning techniques are used excessively. This paper, therefore, attempts to deal with data processing, using a support vector machine (SVM) algorithm in different fields since it is a reliable, efficient classification method in the area of machine learning. Accordingly, many works have been explored in this paper to cover the use of SVM classifier. Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hindreen Rashid Abdulqadir, Subhi R. M. Zeebaree, Hanan M. Shukur, M. A. Sadeeq, B. W. Salim, A. Salih, S. F. Kak
{"title":"A Study of Moving from Cloud Computing to Fog Computing","authors":"Hindreen Rashid Abdulqadir, Subhi R. M. Zeebaree, Hanan M. Shukur, M. A. Sadeeq, B. W. Salim, A. Salih, S. F. Kak","doi":"10.48161/QAJ.V1N2A49","DOIUrl":"https://doi.org/10.48161/QAJ.V1N2A49","url":null,"abstract":"The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capacity, and network failure. Cloud computing and Fog computing carry the cloud closer to IoT computers in order to overcome these problems. Cloud and Fog provide IoT processing and storage of IoT items locally instead of sending them to the cloud. Cloud and Fog provide quicker reactions and better efficiency in conjunction with the cloud. Cloud and fog computing should also be viewed as the safest approach to ensure that IoT delivers reliable and stable resources to multiple IoT customers. This article discusses the latest in cloud and Fog computing and their convergence with IoT by stressing deployment's advantages and complexities. It also concentrates on cloud and Fog design and new IoT technologies, enhanced by utilizing the cloud and Fog model. Finally, transparent topics are addressed, along with potential testing recommendations for cloud storage and Fog computing, and IoT.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dastan Hussen Maulud, Subhi R. M. Zeebaree, Karwan Jacksi, M. A. Sadeeq, K. Sharif
{"title":"State of Art for Semantic Analysis of Natural Language Processing","authors":"Dastan Hussen Maulud, Subhi R. M. Zeebaree, Karwan Jacksi, M. A. Sadeeq, K. Sharif","doi":"10.48161/QAJ.V1N2A44","DOIUrl":"https://doi.org/10.48161/QAJ.V1N2A44","url":null,"abstract":"Semantic analysis is an essential feature of the NLP approach. It indicates, in the appropriate format, the context of a sentence or paragraph. Semantics is about language significance study. The vocabulary used conveys the importance of the subject because of the interrelationship between linguistic classes. In this article, semantic interpretation is carried out in the area of Natural Language Processing. The findings suggest that the best-achieved accuracy of checked papers and those who relied on the Sentiment Analysis approach and the prediction error is minimal.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Concept of Data Mining and Knowledge Extraction Techniques","authors":"R. R. Asaad, Revink Masoud Abdulhakim","doi":"10.48161/QAJ.V1N2A43","DOIUrl":"https://doi.org/10.48161/QAJ.V1N2A43","url":null,"abstract":"Recent days, the concept of data mining and the need for it, its objectives and its uses in various fields, explain its procedures and tools, the type of data that is mined, and the structural structure of that data while simplifying the concept of databases, relational databases and the query language. Explain the benefits and uses of mining or mining data stored in specialized databases in various vital areas of society. Also, it is the process of analyzing data from different perspectives and discovering imbalances, patterns and correlations in data sets that are insightful and useful for predicting results that help you make a good decision. Let's bring back our mining example, when you plan to prospect for gold or any valuable minerals you first have to determine where you think the gold is to start digging. In the process of data mining we have the same concept. To mine data, you must first collect data from various sources, prepare it, and store it in one place, as nothing from data mining is related to the process of searching for the data itself. Currently, the company is storing data in what is called a Datawarehouse which we will talk about in a later stage in detail.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128301584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gene Therapy Approaches","authors":"H. Saadi","doi":"10.48161/QAJ.V1N1A35","DOIUrl":"https://doi.org/10.48161/QAJ.V1N1A35","url":null,"abstract":"Gene therapy can be described broadly as the transfer of genetic material to control a disease or at least to enhance a patient's clinical status. The transformation of viruses into genetic shuttles is one of the core principles of gene therapy, which will introduce the gene of interest into the target tissue and cells. To do this, safe strategies have been invented, using many viral and non-viral vector delivery. Two major methods have emerged: modification in vivo and modification ex vivo. For gene therapeutic approaches which are focused on lifelong expression of the therapeutic gene, retrovirus, adenovirus, adeno-associated viruses are acceptable. Non-viral vectors are much less successful than viral vectors, but because of their low immune responses and their broad therapeutic DNA ability, they have advantages. The addition of viral functions such as receptor-mediated uptake and nuclear translocation of DNA may eventually lead to the development of an artificial virus in order to improve the role of non-viral vectors. For human use in genetic conditions, cancers and acquired illnesses, gene transfer techniques have been allowed. The ideal delivery vehicle has not been identified, although the accessible vector systems are capable of transporting genes in vivo into cells. Therefore, only with great caution can the present viral vectors be used in human beings and further progress in the production of vectors is required. Current progresses in our understanding of gene therapy approaches and their delivery technology, as well as the victors used to deliver therapeutic genes, are the primary goals of this review. For that reason, a literature search on PubMed and Google Scholar was carried out using different keywords.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133510504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Sadeeq, N. M. Abdulkareem, Subhi R. M. Zeebaree, D. M. Ahmed, A. Sami, R. Zebari
{"title":"IoT and Cloud Computing Issues, Challenges and Opportunities: A Review","authors":"M. A. Sadeeq, N. M. Abdulkareem, Subhi R. M. Zeebaree, D. M. Ahmed, A. Sami, R. Zebari","doi":"10.48161/QAJ.V1N2A36","DOIUrl":"https://doi.org/10.48161/QAJ.V1N2A36","url":null,"abstract":"With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets are constantly producing a vast volume of data. It is unwise to locally store all the raw data in the IIoT devices since the energy and storage spaces of the end devices are strictly constrained. self-organization and short-range Internet of Things (IoT) networking also support outsourced data and cloud computing, independent of the distinctive resource constraint properties. For the remainder of the findings, there is a sequence of unfamiliar safeguards for IoT and cloud integration problems. The delivery of cloud computing is highly efficient, storage is becoming more and more current, and some groups are now altering their data from in house records Cloud Computing Vendors' hubs. Intensive IoT applications for workloads and data are subject to challenges while utilizing cloud computing tools. In this report, we research IoT and cloud computing and address cloud-compatible problems and computing techniques to promote the stable transition of IoT programs to the cloud.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Particle Swarm Optimization and Genetic Algorithm","authors":"N. Hasanova","doi":"10.48161/QAJ.V1N1A7","DOIUrl":"https://doi.org/10.48161/QAJ.V1N1A7","url":null,"abstract":"This paper provides an introduction and a comparison of two widely used evolutionary computation algorithms: Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) based on the previous studies and researches. It describes Genetic Algorithm basic functionalities including various steps such as selection, crossover, and mutation.","PeriodicalId":220595,"journal":{"name":"Qubahan Academic Journal","volume":"43 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132359378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}