UHD Journal of Science and Technology最新文献

筛选
英文 中文
A Review of Database Security Concepts, Risks, and Problems 数据库安全概念、风险和问题综述
UHD Journal of Science and Technology Pub Date : 2021-10-10 DOI: 10.21928/uhdjst.v5n2y2021.pp38-46
Ramyar A. Teimoor
{"title":"A Review of Database Security Concepts, Risks, and Problems","authors":"Ramyar A. Teimoor","doi":"10.21928/uhdjst.v5n2y2021.pp38-46","DOIUrl":"https://doi.org/10.21928/uhdjst.v5n2y2021.pp38-46","url":null,"abstract":"Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44775541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Luminosity Function of Galaxies in Some Nearby Clusters 邻近星系团中星系的光度函数
UHD Journal of Science and Technology Pub Date : 2021-07-03 DOI: 10.21928/UHDJST.V5N2Y2021.PP1-10
M. A. Rasheed, Khalid K. Mohammad
{"title":"The Luminosity Function of Galaxies in Some Nearby Clusters","authors":"M. A. Rasheed, Khalid K. Mohammad","doi":"10.21928/UHDJST.V5N2Y2021.PP1-10","DOIUrl":"https://doi.org/10.21928/UHDJST.V5N2Y2021.PP1-10","url":null,"abstract":"In the present work, the galaxy luminosity function (LF) has been studied for a sample of seven clusters in the redshift range (0.0 ≲ z ≲ 0.1), within Abell radius (1.5 h−1 Mpc), in the five SDSS passbands ugriz. In each case, the absolute magnitude distribution is found and then fitted with a Schechter function. The fitting is done, using the χ2 – minimization method to find the best values of Schechter parameters Ф* (normalization constant), M* (characteristic absolute magnitude), and α (faint-end slope). No remarkable changes are found in the values of M* and α, for any cluster, in any passband. Furthermore, the LF does not seem to vary with such cluster parameters as richness, velocity dispersion, and Bautz–Morgan morphology. Finally, it is found that M* becomes brighter toward redder bands, whereas almost no variation is seen in the value of α with passband, being around (−1.00).","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44838242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kurdish Text Segmentation using Projection-Based Approaches 基于投影方法的库尔德语文本分割
UHD Journal of Science and Technology Pub Date : 2021-05-16 DOI: 10.21928/uhdjst.v5n1y2021.pp56-65
Tofiq Ahmed Tofiq, Jamal Ali Hussein
{"title":"Kurdish Text Segmentation using Projection-Based Approaches","authors":"Tofiq Ahmed Tofiq, Jamal Ali Hussein","doi":"10.21928/uhdjst.v5n1y2021.pp56-65","DOIUrl":"https://doi.org/10.21928/uhdjst.v5n1y2021.pp56-65","url":null,"abstract":"An optical character recognition (OCR) system may be the solution to data entry problems for saving the printed document as a soft copy of them. Therefore, OCR systems are being developed for all languages, and Kurdish is no exception. Kurdish is one of the languages that present special challenges to OCR. The main challenge of Kurdish is that it is mostly cursive. Therefore, a segmentation process must be able to specify the beginning and end of the characters. This step is important for character recognition. This paper presents an algorithm for Kurdish character segmentation. The proposed algorithm uses the projection-based approach concepts to separate lines, words, and characters. The algorithm works through the vertical projection of a word and then identifies the splitting areas of the word characters. Then, a post-processing stage is used to handle the over-segmentation problems that occur in the initial segmentation stage. The proposed method is tested using a data set consisting of images of texts that vary in font size, type, and style of more than 63,000 characters. The experiments show that the proposed algorithm can segment Kurdish words with an average accuracy of 98.6%.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44521582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Urban Rainwater Harvesting Assessment in Sulaimani Heights District, Sulaimani City, KRG, Iraq 伊拉克KRG市苏莱曼尼高地区城市雨水收集评估
UHD Journal of Science and Technology Pub Date : 2021-04-27 DOI: 10.21928/uhdjst.v5n1y2021.pp48-55
Kani Namiq Gharib, Nawbahar F. Mustafa, H. Rashid
{"title":"Urban Rainwater Harvesting Assessment in Sulaimani Heights District, Sulaimani City, KRG, Iraq","authors":"Kani Namiq Gharib, Nawbahar F. Mustafa, H. Rashid","doi":"10.21928/uhdjst.v5n1y2021.pp48-55","DOIUrl":"https://doi.org/10.21928/uhdjst.v5n1y2021.pp48-55","url":null,"abstract":"Rainwater harvesting is the collection of rainwater and runoff from catchment areas such as roofs or other urban surfaces. Collected water has productive end-uses such as irrigation, industry, domestic, and can recharge groundwater. Sulaimani heights have been selected as a study area, which is located in Sulaimani Governorate in Kurdistan Region, North Iraq. The main objective of this study was to estimate the amount of harvested rainwater form Sulaimani heights urban area in Sulaimani City. Three methods for runoff calculation have been compared, the storm water management model (SWMM), the soil conservation service (SCS) method, and the runoff coefficient (RC) using daily rainfall data from 1991 to 2019. The annual harvested runoff results with the three different methods SWMM, SCS, and RC were estimated as 836,470 m3, 508,454 m3, and 737,381 m3, respectively. The results showed that SWMM method has the highest runoff result and could meet 31% of the total demand of the study area and 28% and 19% for RC and SCS methods, respectively.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45911363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Use Local Image Dataset and Correlation Technique 基于局部图像数据集和相关技术的人脸识别
UHD Journal of Science and Technology Pub Date : 2021-01-01 DOI: 10.21928/uhdjst.v5n2y2021.pp26-31
Dana Faiq Abd
{"title":"Face Recognition Use Local Image Dataset and Correlation Technique","authors":"Dana Faiq Abd","doi":"10.21928/uhdjst.v5n2y2021.pp26-31","DOIUrl":"https://doi.org/10.21928/uhdjst.v5n2y2021.pp26-31","url":null,"abstract":"Face recognition is an extreme topic in security field which identifies humans through physiological or behavioral biometric characteristics. Face recognition can also identify the human almost in a precise detection; one of the primary problems in face recognition is the accurate recognition rate. Local datasets use for implementing this research rather than using public datasets. Midian filter uses to remove noise and identify errors, also obtains a good accuracy rate without modifying image quality. In addition, filter processing applies to modify and progress images and the discrete wavelet transforms algorithm uses as feature extraction. Many steps are applied in this approach such as image acquisition, converting images into gray scale, cropping the image, and then passing to the feature extraction. In order to get the final decision about the indicated face, some required steps are used in the comparison. The results show the accuracy of 91% of the recognition rate through the human face.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68397971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Different Ensemble Methods in Credit Card Default Prediction 不同集成方法在信用卡违约预测中的比较
UHD Journal of Science and Technology Pub Date : 2021-01-01 DOI: 10.21928/uhdjst.v5n2y2021.pp20-25
A. A. Faraj, Didam Ahmed Mahmud, B. Rashid
{"title":"Comparison of Different Ensemble Methods in Credit Card Default Prediction","authors":"A. A. Faraj, Didam Ahmed Mahmud, B. Rashid","doi":"10.21928/uhdjst.v5n2y2021.pp20-25","DOIUrl":"https://doi.org/10.21928/uhdjst.v5n2y2021.pp20-25","url":null,"abstract":"Credit card defaults pause a business-critical threat in banking systems thus prompt detection of defaulters is a crucial and challenging research problem. Machine learning algorithms must deal with a heavily skewed dataset since the ratio of defaulters to non-defaulters is very small. The purpose of this research is to apply different ensemble methods and compare their performance in detecting the probability of defaults customer’s credit card default payments in Taiwan from the UCI Machine learning repository. This is done on both the original skewed dataset and then on balanced dataset several studies have showed the superiority of neural networks as compared to traditional machine learning algorithms, the results of our study show that ensemble methods consistently outperform Neural Networks and other machine learning algorithms in terms of F1 score and area under receiver operating characteristic curve regardless of balancing the dataset or ignoring the imbalance","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68397659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Intrusion Detection using a Combination of Fuzzy Clustering and Ant Colony Algorithm 基于模糊聚类和蚁群算法的网络入侵检测
UHD Journal of Science and Technology Pub Date : 2021-01-01 DOI: 10.21928/uhdjst.v5n2y2021.pp11-19
Yadgar Sirwan Abdulrahman
{"title":"Network Intrusion Detection using a Combination of Fuzzy Clustering and Ant Colony Algorithm","authors":"Yadgar Sirwan Abdulrahman","doi":"10.21928/uhdjst.v5n2y2021.pp11-19","DOIUrl":"https://doi.org/10.21928/uhdjst.v5n2y2021.pp11-19","url":null,"abstract":"As information technology grows, network security is a significant issue and challenge. The intrusion detection system (IDS) is known as the main component of a secure network. An IDS can be considered a set of tools to help identify and report abnormal activities in the network. In this study, we use data mining of a new framework using fuzzy tools and combine it with the ant colony optimization algorithm (ACOR) to overcome the shortcomings of the k-means clustering method and improve detection accuracy in IDSs. Introduced IDS. The ACOR algorithm is recognized as a fast and accurate meta-method for optimization problems. We combine the improved ACOR with the fuzzy c-means algorithm to achieve efficient clustering and intrusion detection. Our proposed hybrid algorithm is reviewed with the NSL-KDD dataset and the ISCX 2012 dataset using various criteria. For further evaluation, our method is compared to other tasks, and the results are compared show that the proposed algorithm has performed better in all cases.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68398060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fusion Method with Mean-discrete Algorithm in Feature level for Identical twins Identification 特征层均值离散融合的同卵双胞胎识别方法
UHD Journal of Science and Technology Pub Date : 2020-12-27 DOI: 10.21928/uhdjst.v4n2y2020.pp141-150
Bayan Omar
{"title":"Fusion Method with Mean-discrete Algorithm in Feature level for Identical twins Identification","authors":"Bayan Omar","doi":"10.21928/uhdjst.v4n2y2020.pp141-150","DOIUrl":"https://doi.org/10.21928/uhdjst.v4n2y2020.pp141-150","url":null,"abstract":"The study on twins is an important form of study in the forensic and biometrics field as twins share similar genetic traits. A biometric is one of the common types of pattern recognition which acquires biometric data from a person. From these data, a feature is established and extracted where these features can be used to identify individual. Exiting works in biometric identification concentrate on unimodal biometric identification. The high similarity in a pair of twin’s biometric may lead to miss performance. Hence, due to their great accurateness, multimodal biometric systems have become more favored than unimodal biometric systems in identical twins identification. However, these systems are highly complex. We proposed Mean-Discrete feature based fusion algorithm for Kurdish handwriting and fingerprint for identical twins detection. Its viability and advantage over the unimodal biometric systems are highlighted. This paper employed 800 images from 50 pairs of identical twins from Kurdistan Region to carry out the experiment.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42014794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart University Library Management System Based on Internet of Things 基于物联网的智能高校图书馆管理系统
UHD Journal of Science and Technology Pub Date : 2020-08-20 DOI: 10.21928/UHDJST.V4N2Y2020.PP63-74
Sivana Salahadin Muhamad, A. Darwesh
{"title":"Smart University Library Management System Based on Internet of Things","authors":"Sivana Salahadin Muhamad, A. Darwesh","doi":"10.21928/UHDJST.V4N2Y2020.PP63-74","DOIUrl":"https://doi.org/10.21928/UHDJST.V4N2Y2020.PP63-74","url":null,"abstract":"With the innovation of new technologies, many life concepts have been changed. However, libraries remain the same in many sides while the main role of libraries has been changed and new references may not need a classical library as it was 50 years ago. In the same time, library services can be improved using Internet of Things (IoT) to increase user satisfactions. In recent years, there has been arisen in the diversity of implementation based on radio-frequency identification (RFID) systems and has been successfully utilized in several areas such as health care and transportation. RFID-based library management system will let rapid transaction flow for the library and could prove instant and long-term benefits to library in traceability and security. To solve the problem that it is inconvenient to find references in the traditional library, a kind of reference positioning system using RFID technology is designed to achieve fast search references in the library. Searching and sorting misplaced references are a hard task often carried out by the librarians. In this paper, the performance of RFID reader motion and tags allows fast transaction flow and easily handling the process like references borrowing from library can be done using RFID technology and users will get notified using Global System for Mobile. Two big issues have been exposed and tried to find the best solution for them, first is the management process of any library, from user management to shelving system and the second one is the data and reference security. The results show that the system can quickly find the references that bookworms hid, and the references are not timely put back on the shelves. Furthermore, the new library hall design and IoT-based system improve the security.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45857823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Review of Properties and Functions of Narrow Band Internet of Things and its Security Requirements 窄带物联网的特性、功能及安全需求综述
UHD Journal of Science and Technology Pub Date : 2020-03-22 DOI: 10.21928/uhdjst.v4n1y2020.pp71-81
Zana Azeez Kakarash, F. Mardukhi
{"title":"A Review of Properties and Functions of Narrow Band Internet of Things and its Security Requirements","authors":"Zana Azeez Kakarash, F. Mardukhi","doi":"10.21928/uhdjst.v4n1y2020.pp71-81","DOIUrl":"https://doi.org/10.21928/uhdjst.v4n1y2020.pp71-81","url":null,"abstract":"IOT is a new web sample based on the fact that there are many things and entities other than humans that can connect to the Internet. This fact means that machines or things can automatically interconnected without the need of interacting with humans and thus become the most important entities that create Internet data. In this article, we first examine the challenges of IOT. Then we introduce features of NB- IOT through browsing current international studies on  NB- IOT technology in which, we focus on basic theories and key technologies , such as the connection number analysis theory, the theory of delay analysis, the coating increase mechanism , low energy consumption technology, and the connection of the relationship between signaling and data .Then we compare some functions of NB- IOT and other wireless telecommunication technologies in terms of latency, security, availability, data transfer speed, energy consumption, spectral efficiency, and coverage area .  Finally, we review and summarize NB- IOT security requirements that should be solved immediately. These topics are provided to overview NB- IOT which can offer a complete familiarity with this area.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48904348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信