Kardo Othman Aziz, Ramyar Abdulrahman Teimoor, Tofiq Ahmed Tofiq, Dilman Salih Abdulla
{"title":"Kurdish Sorani Dialect Morphology Generation Using a Concatenative Strategy","authors":"Kardo Othman Aziz, Ramyar Abdulrahman Teimoor, Tofiq Ahmed Tofiq, Dilman Salih Abdulla","doi":"10.21928/uhdjst.v8n1y2024.pp13-19","DOIUrl":"https://doi.org/10.21928/uhdjst.v8n1y2024.pp13-19","url":null,"abstract":"In natural language processing, morphological generation refers to the creation of the appropriate inflected forms of words based on a predetermined set of morphological rules. However, it might be difficult to generate morphology in languages with intricate morphological systems, like the Kurdish Sorani dialect. The concatenative morphology-based unique technique to morphological generation in Kurdish Sorani is proposed in this research. The suggested strategy tries to get over the drawbacks of current approaches and enhance the precision and effectiveness of morphological generation in Kurdish Sorani. The suggested technique generates all conceivable subjective and objective pronouns in both positive and negative forms, together with the various verb tenses for Kurdish morphology. The study presents a detailed examination of Kurdish Sorani’s morphology and points out the difficulties in coming up with the right verbforms. The authors suggest a concatenative morphology-based morphological generating system that comprises of a morphological analyzer and a morphological generator.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139627685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jafar A. Ali, Loghman Khodakarami, Zulfa J. Khudadad, Jehan M. Rustam, Aya B. Shawkat, Srwa S. Ali, Bala A. Faqe
{"title":"Investigating the Influence of Environmental Factors on Corrosion in Pipelines Using Geospatial Modeling","authors":"Jafar A. Ali, Loghman Khodakarami, Zulfa J. Khudadad, Jehan M. Rustam, Aya B. Shawkat, Srwa S. Ali, Bala A. Faqe","doi":"10.21928/uhdjst.v8n1y2024.pp1-12","DOIUrl":"https://doi.org/10.21928/uhdjst.v8n1y2024.pp1-12","url":null,"abstract":"This study integrated geographic information system (GIS) and remote sensing technology to identify areas around pipelines that are more susceptible to corrosion having the Kurdistan pipeline as a case study. Geospatial data are used to target factors such as rainfall, temperature, rivers, and minerals which increase the corrosion rate. Spatial data such as, the direction of slope, rainfall, proximity to rivers, and minerals, were collected and analyzed; maps were created for every individual factor to visualize their distribution. By overlaying these maps, regions that are at higher risk of corrosion were identified, which can be prioritized for further investigation or preventive measures. This paper’s findings are significant for oil and gas industries, including pipeline operators and designers as corrosion can lead to devastating consequences. The novelty of this study is to identify areas along the pipeline at higher risk of corrosion through the application of geospatial information systems and remote sensing. This methodology holds immense potential for industries looking to proactively prevent corrosion through the implementation of preventative maintenance, monitoring programs, and the application of protective coatings and inhibitors. The results of this research demonstrate that environmental data, GIS, and remote sensing can predict corrosion in oil pipelines, offering valuable insights for better managing corrosion risk.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"53 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139536094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Ani, Qeethara Al-Shayea, S. M. Al-Barzinji, Dimah Mezher Shaban Al-Ani, Zainab Mezher Shaban Al-Ani
{"title":"COVID-19 Diagnosis Applied DWT and CNN on X-ray Chest Images","authors":"M. Al-Ani, Qeethara Al-Shayea, S. M. Al-Barzinji, Dimah Mezher Shaban Al-Ani, Zainab Mezher Shaban Al-Ani","doi":"10.21928/uhdjst.v7n2y2023.pp69-76","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n2y2023.pp69-76","url":null,"abstract":"Background: Medical images have many important applications, and this importance increased when the emergence of the COVID-19 pandemic. These applications have been focused on computed tomography chest images and X-ray images. This research will focus on special X-ray medical image applications of coronavirus (COVID-19).Methods: Many methods are applied on medical images to achieve certain features. The designed approach is implemented through many steps starting from preprocessing up to classification step. The proposed approach focusing on generating efficient features using discrete wavelet transform (DWT) then applying convolutional neural network (CNN) to classify between normal and abnormal COVID-19.Results: The COVID-19 diagnosis approach is implemented to achieve high performance system. The obtained result of COVID-19 diagnosis applied CNN tool leading to validation accuracy of 92.31%.Conclusion: Hybridizing two technologies (DWT and CNN) is intended to reach the best results in the diagnostic process. In addition, X-ray chest image is an important tool for detection and diagnosis of COVID-19 diseases.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"118 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138959752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acoustic Comfort Evaluation in Traditional Houses and its Impact on Inhabitant Satisfaction in the City of Sulaimani","authors":"Shilan Ameen Mustafa, Banaz N. Muhealdeen","doi":"10.21928/uhdjst.v7n2y2023.pp50-68","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n2y2023.pp50-68","url":null,"abstract":"Acoustic comfort is one of the essential needs for people to live in calm and comfort in dwellings. Because of technological and industrial development, noise pollution became one of the big dangers that impacts human psychologically and physiologically. The historical neighborhoods in Sulaimani City are affected by this technological advancement, the demolishing of traditional houses and changed to commercial has increased the environmental noise. Therefore, this research aims to evaluate residents’ satisfaction in traditional houses in term of acoustic conditions, also aims to investigate if the design characteristics of traditional houses have role in providing acoustic comfort, and to promote traditional designs in today’s architecture. The absence of a practical study evaluating acoustic conditions in traditional houses and their impact on inhabitants’ satisfaction in Sulaimani city formed the main problem of the research. The results from the questionnaire and the in situ measurements have shown that, although most of these old houses were demolished and changed to commercial areas, the acoustic environment inside most houses is comfortable and most inhabitants are satisfied with the acoustic conditions. The traditional design turned the houses to be a barrier against transmitting noise whether from outside to inside or vice versa.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"20 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138972300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fully Homomorphic Encryption Scheme for Securing Cloud Data","authors":"Tara Al Attar, Mohammed Anwar MOHAMMED","doi":"10.21928/uhdjst.v7n2y2023.pp40-49","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n2y2023.pp40-49","url":null,"abstract":"One of the pioneer and important fields in the computer science area is cloud computing. The data within cloud computing are usually transformed to it from local storage; therefore, the security of this data is an important issue. To solve this data security issue, it is important that cloud service providers (CSPs) store encrypted versions of user data. Before transmitting data to the cloud provider, it was encrypted using traditional encryption schemes. Nevertheless, for these schemes, the private key must be provided to the server to be used for the decryption on the other side before any calculations, yielding a security risk and issue for the cloud data. Homomorphic encryption provides a capable solution to this issue since it enables calculations on encrypted data with no need to be decrypted and the private encryption key is not compromised. A new fully homomorphic encryption scheme to protect cloud data is proposed in this paper, it is called NAZUZ. The NAZUZ scheme is based on prime modular operations and encrypts messages by operating on each character without converting them to binary. NAZUZ security relies on the difficulty of factoring large integer numbers and introduces noise complexity to the plaintext through the number of CSP users.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136358795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link Prediction in Dynamic Networks Based on the Selection of Similarity Criteria and Machine Learning","authors":"Karwan Mohammed Hamakarim","doi":"10.21928/uhdjst.v7n2y2023.pp32-39","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n2y2023.pp32-39","url":null,"abstract":"The study’s findings showed that link prediction utilizing the similarity learning model in dynamic networks (LSDN) performed better than other learning techniques including neural network learning and decision tree learning in terms of the three criteria of accuracy, coverage, and efficiency., Compared to the random forest approach, the LSDN learning algorithm’s link prediction accuracy increased from 97% to 99%. The proposed method’s use of oversampling, which improved link prediction accuracy, was the cause of the improvement in area under the curve (AUC). To bring the ratio of the classes closer together, the suggested strategy attempted to produce more samples from the minority class. In addition, similarity criteria were chosen utilizing feature selection techniques based on correlation that had a strong link with classes. This technique decreased over-fitting and improved the suggested method’s test data generalizability. Based on the three criteria (accuracy, coverage, and efficiency), the research’s findings demonstrated that link prediction utilizing the similarity LSDN outperformed other learning techniques including neural network learning and decision tree learning. Compared to the random forest algorithm, the LSDN algorithm’s link prediction accuracy increased from 97% to 99%. The oversampling in the suggested strategy, which increased link prediction accuracy, is what caused the increase in AUC. To bring the ratio of the classes closer together, the suggested strategy attempted to produce more samples from the minority class. In addition, similarity criteria were chosen utilizing feature selection techniques based on correlation that had a strong link with classes. This technique decreased over-fitting and improved the suggested method’s test data generalizability.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49526982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing the Performance of Bitcoin to Gold Prices, the Telecommunications Market, the Stock Price Index, and Insurance Companies’ Performance from (March 1, 2021–September 4, 2023)","authors":"Hawre Latif Majeed, Diary Jalal Ali, T. Mohammed","doi":"10.21928/uhdjst.v7n2y2023.pp16-31","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n2y2023.pp16-31","url":null,"abstract":"Managing cryptocurrencies by financial intermediaries offer numerous benefits to global financial markets and the economy. Among all cryptocurrencies, Bitcoin stands out with the highest market capitalization and a weak correlation to other assets, making it an attractive option for portfolio diversification and risk management. This research aims to examine the impact of Bitcoin on the NASDAQ gold price (GC), the telecommunications market (IXUT), and insurance company performance (IXIS) through the analysis of secondary data from March 1, 2021, to September 4, 2023. The data were obtained from https://www.investing.com; statistical software E views applied various econometric methods to the data. The results suggest a positive correlation between Bitcoin and the other variables, indicating that Bitcoin can significantly expand investment opportunities and drive economic growth. This study highlights the importance of considering cryptocurrencies, especially Bitcoin, as a viable option for investment diversification and risk management in financial markets.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43133961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Computer Vision–Based Traffic Controlling and Monitoring","authors":"Kamaran H. Manguri, A. Mohammed","doi":"10.21928/uhdjst.v7n2y2023.pp6-15","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n2y2023.pp6-15","url":null,"abstract":"Due to the rapid increase of the population in the world, traffic signal controlling and monitoring has become an important issue to be solved with regard to the direct relation between the number of populations and the cars’ usage. In this regard, an intelligent traffic signaling with a rapid urbanization is required to prevent the traffic congestions, cost reduction, minimization in travel time, and CO2 emissions to atmosphere. This paper provides a comprehensive review of computer vision techniques for autonomic traffic control and monitoring. Moreover, recent published articles in four related topics including density estimation investigation, traffic sign detection and recognition, accident detection, and emergency vehicle detection are investigated. The conducted survey shows that there is no fair comparison and performance evaluation due to the large number of involved parameters in the abovementioned four topics which can control the traffic signal controlling system such as (computation time, dataset availability, and an accuracy).","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44500934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Blood Protozoa Infestation Transmitted by Vector Tikes among Awassi Sheep Herds in Kifri City, Kurdistan Region of Iraq","authors":"Mahmoodiyan Hossein","doi":"10.21928/uhdjst.v7n2y2023.pp1-5","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n2y2023.pp1-5","url":null,"abstract":"Blood protozoan disease is a common disease among animals in the Kifri city, Kurdistan region of Iraq that this disease is mostly transmitted by ticks. Therefore, the present study aimed to investigate the level of blood protozoan and to identify vector ticks in the native breed sheep (Awassi sheep) in Kifri city. For this purpose, blood samples were taken from 150 sheep suspected suffering from protozoan infection according to their clinical symptoms. In the present study, we prepared blood slides from suspected sheep and stained with Giemsa staining, and then at the same time, hard ticks were collected from the sheep’s body. Then, the protozoan type was diagnosed and the vector tick species were identified by microscopically. The obtained results were statistically analyzed by the chi-square test. The results showed that 35 (23.33%) of that samples were infected with Babesia protozoa as 25 samples (16.66%) were infected with Babesia ovis, seven samples (4.66%) with Babesia mutasi, and three samples (2%) with B. ovis and B. mutasi. No infestation with Theileria and Anaplasma species was found. Rhipicephalus, Hyalomma, Dermacentor, and Haemaphysalis ticks were isolated and identified from the studied sheep. The results showed that the presence of the Rhipicephalus bursa tick is significantly (P < 0.05) related to the existence of Babesiosis disease in sheep. This study concluded that most of the studied sheep in Kifri city are infected with Babesia protozoa, especially B. ovis.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46940825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Boundary Integral Equation Method for Computing Numerical Conformal Mappings onto the Disk with Rectilinear Slit and Spiral Slits Regions","authors":"Ali W. K. Sangawi","doi":"10.21928/uhdjst.v7n1y2023.pp92-99","DOIUrl":"https://doi.org/10.21928/uhdjst.v7n1y2023.pp92-99","url":null,"abstract":"This article proposes a boundary integral equation method for computing numerical conformal mappings of bounded multiply connected region Ω onto the disk with rectilinear slit and spiral slits regions, Ω1 and Ω2 Initially, the process involves calculating the boundary value of the canonical region. Cauchy’s integral formula can then be used to compute the mapping of the interior values. The effectiveness of the proposed method is demonstrated using several numerical examples.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49350402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}