{"title":"Feature Selection and Dynamic Network Traffic Congestion Classification based on Machine Learning for Internet of Things","authors":"Ahmed A. Elngar, Adriana Burlea‐Schiopoiu","doi":"10.31185/wjcms.150","DOIUrl":"https://doi.org/10.31185/wjcms.150","url":null,"abstract":"The network traffic congestion classifier is essential for network monitoring systems. Network traffic characterization is a methodology to classify traffic into several classes supporting various attributes. In this paper, payload-based classification is suggested for network traffic characterization. It has a broad scope of utilization like network security assessment, intrusion identification, QoS supplier, et cetera; furthermore, it has significance in investigating different suspicious movements in the network. Numerous supervised classification techniques like Support Vector Machines and unsupervised clustering methods like K-Means connected are used in traffic classification. In current network conditions, minimal supervised data and unfamiliar applications influence the usual classification procedure's performance. This paper implements a methodology for network traffic classification using clustering, feature extraction, and variety for the Internet of Things (IoT). Further, K-Means is used for network traffic clustering datasets, and feature extraction is performed on grouped information. KNN, Naïve Bayes, and Decision Tree classification methods classify network traffic because of extracted features, which presents a performance measurement between these classification algorithms. The results discuss the best machine learning algorithm for network congestion classification. According to the outcome, clustering (k-means) with network classification (Decision Tree) generates a higher accuracy, 86.45 %, than other clustering and network classification","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum Design of Scanned Linear Antenna Array Using Sine Cosine Optimization Algorithm","authors":"Alhussein Alturfi, S. Goyal, Amrit Kaur","doi":"10.31185/wjcms.135","DOIUrl":"https://doi.org/10.31185/wjcms.135","url":null,"abstract":"In this article, the side lobe level (SLL) of the radiation pattern is reduced, and the first null beam width (FNBW) is kept constant by synthesizing symmetric scanning Linear Antenna Arrays (LAA), which is done by considering excitation amplitude as the optimization parameter. A Sine cosine algorithm (SCA) is used to achieve this objective. Three different case studies are illustratedin this article to show the effectiveness of SCA in LAA optimization. The results obtained show that the SCA algorithm performs better than Firefly Algorithm (FA), Symbiotic Organisms Search (SOS), and hybrid optimization algorithm based on Grasshopper Optimization Algorithm (GOA) and Antlion Optimization (ALO)","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On θg**- Closed Sets in Topological Spaces","authors":"Ahmed Hussein Wajan Alrikabiu, Ali Khalaf Hussain","doi":"10.31185/wjcms.124","DOIUrl":"https://doi.org/10.31185/wjcms.124","url":null,"abstract":"In this paper we have introduced a new class of closed in topological spaces called g**-closed sets and study some of its properties . Further we introduce the concept g**-continuous functions , g**-irresolute functions . As an application we introduce two news paces namely . T **-space, **T - space .Further, g**-continuous, and g**-irresolute mappings are also introduced and investigated .","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Speech Signal for Emotion Recognition Using Hybrid Features with SVM Classifier","authors":"Fatima A.Hammed, Loay E. George","doi":"10.31185/wjcm.102","DOIUrl":"https://doi.org/10.31185/wjcm.102","url":null,"abstract":"Emotion recognition is a hot topic that has received a lot of attention and study,owing to its significance in a variety of fields, including applications needing human-computer interaction (HCI). Extracting features related to the emotional state of speech remains one of the important research challenges.This study investigated the approach of the core idea behind feature extraction is the residual signal of the prediction procedure is the difference between the original and the prediction .hence the visibility of using sets of extracting features from speech single when the statistical of local features were used to achieve high detection accuracy for seven emotions. The proposed approach is based on the fact that local features can provide efficient representations suitable for pattern recognition. Publicly available speech datasets like the Berlin dataset are tested using a support vector machine (SVM) classifier. The hybrid features were trained separately. The results indicated that some features were terrible. Some were very encouraging, reaching 99.4%. In this article, the SVM classifier test results with the same tested hybrid features that published in a previous article will be presented, also a comparison between some related works and the proposed technique in speech emotion recognition techniques.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face detection by using Haar Cascade Classifier","authors":"S. Hashim, Paul McCullagh","doi":"10.31185/wjcm.109","DOIUrl":"https://doi.org/10.31185/wjcm.109","url":null,"abstract":"the Haar Cascade Classifier is a popular technique for object detection that uses a machine-learning approach to identify objects in images and videos. In the context of face detection, the algorithm uses a series of classifiers that are trained on thousands of positive and negative images to identify regions of the image that may contain a face. The algorithm is a multi-stage process that involves collecting training data, extracting features, training the classifiers, building the cascade classifier, detecting faces in the test image, and post-processing the results to remove false positives and false negatives. The algorithm has been shown to be highly accurate and efficient for detecting faces in images and videos, but it has some limitations, including difficulty in detecting faces under challenging lighting conditions or when the faces are partially occluded. Overall, the Haar Cascade Classifier algorithm remains a powerful and widely-used tool for face detection, but it is important to carefully evaluate its performance in the specific context of each application and consider using more advanced techniques when necessary.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain and Machine Learning as Deep Reinforcement","authors":"Hiba S. Mahdi","doi":"10.31185/wjcm.103","DOIUrl":"https://doi.org/10.31185/wjcm.103","url":null,"abstract":"Due to its capacity to make wise decisions, deep learning has become extremely popular in recent years. The current generation of deep learning, which heavily rely centralized servers, are unable to offer attributes like operational transparency, stability, security, and reliable data provenance. Additionally, Single point of failure is a problem that deep learning designs are susceptible since they need centralized data to train them. We review the body of research on the application of deep learning to blockchain. We categorize and arrange the literature for developing topic taxonomy based their criteria: Application domain, deep learning-specific consensus mechanisms, goals for deployment and blockchain type. To facilitate meaningful discussions, we list the benefits and drawbacks of the most cutting-edge blockchain-based deep learning frameworks.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130616179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT sensor network data processing using the TWLGA Scheduling Algorithm and the Hadoop Cloud Platform","authors":"M. Rashid, Wisam Abed","doi":"10.31185/wjcm.122","DOIUrl":"https://doi.org/10.31185/wjcm.122","url":null,"abstract":"Monitoring environmental conditions can be done effectively with the help of the Internet of Things (IOT) sensor network. Massive data generated by IOT sensor networks presents technological hurdles in terms of storage, processing, and querying. A Hadoop cloud platform is suggested as a fix for the issue. The data processing platform makes it possible for one node's work to be shared with others employing the time and workload genetic algorithm (TWLGA), which lowers the risk of software and hardware compatibility while simultaneously increasing the efficiency of a single node. For the experiment, a Hadoop cluster platform employing the TWLGA scheduling algorithm is built, and its performance is assessed. The outcomes demonstrate that processing huge volumes of data from the IOT sensor network is acceptable for the Hadoop cloud platform .","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey","authors":"Mohammed abd, H. Majeed, Sif. K. Ebis","doi":"10.31185/wjcm.106","DOIUrl":"https://doi.org/10.31185/wjcm.106","url":null,"abstract":"At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125454571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAR Calculation in a Child Seven-Layer Head Model at 2.1 and 2.6 GHz","authors":"G. Ahmed, A. Sallomi","doi":"10.31185/wjcm.105","DOIUrl":"https://doi.org/10.31185/wjcm.105","url":null,"abstract":"Health and safety concerns have grown in recent years due to the increasing frequency bands and the demand for wireless communication apparatus. Electromagnetic (EM) radiation breakthrough from Radio frequency (RF) into the human head is an issue that needs to be addressed. Radiation from RF sources can cause serious biological hazards inside the human body. This study measures the average Specific Absorption Rate in a 7-year-old child's head tissues using the ANSYS HFSS software and varying the distance from the source to the antenna in order to address these issues. SAR levels of phones sold should be below certain standard limits. We have used an internal antenna of a mobile phone It's a planar inverted F-antenna (PIFA) with a connected feeding structure. \u0000 ","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121594380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Control System of DC Motor Speed: Systematic Review","authors":"Muhammad Hilal, H. Alrikabi, Ibtisam A. Aljazaery","doi":"10.31185/wjcm.121","DOIUrl":"https://doi.org/10.31185/wjcm.121","url":null,"abstract":"The first sources of direct current (DC) were invented, DC machines were one of the first types of electro-mechanical machines used. DC machines are more advantageous over AC machines as regards to Speed regulation and versatility. A DC motor is an electrical actuator with a lot of control that is used in a lot of applications, like robotic manipulators, guided vehicles, steel rolling mills, cutting tools, overhead cranes, electrical traction, and other applications. Due to their speed-torque characteristics and ease of control, DC motors are utilized extensively in industries for demanding variable speed applications. In terms of controller design and implementation, the process control industry has seen numerous advancements over the past two decades. In the industry, there is a great demand for automatic controllers that can respond quickly and accurately to perform precise tasks. The feedback loop is an essential component of system control that must be utilized in order to achieve the desired performance in the majority of systems. Numerous control strategies have been developed for various feedback control systems in order to achieve rapid system dynamic response. Controls in a drive system are crucial if the reference speed is to be accurately and quickly tracked, with little or no steady-state error and as little overshoot as possible. This paper presents the Systematic literature review that was conducted as covers pertinent established concepts and techniques related to the DC motor speed control system design, for applications that require actuators with accurate speed characteristics. Simulation and real time implementation results employed for DC motor speed control systems in various literature are analysed and discussed.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132187406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}