{"title":"A REVIEW STUDY ON THE ADOPTION OF CLOUD COMPUTING FOR HIGHER EDUCATION IN KURDISTAN REGION- IRAQ","authors":"Abbas M. Ahmed, Osamah Waleed Allawi","doi":"10.21928/uhdjst.v4n1y2020.pp70-81","DOIUrl":"https://doi.org/10.21928/uhdjst.v4n1y2020.pp70-81","url":null,"abstract":"Cloud computing is considering as a popular computing model in the Western World. It is still not well understood by much higher education (HE) institutions in the developing world. CC will have a huge effect on the academic and learning environment which will enable their users (i.e., students, educators, and heads) to play out their undertakings adequately with less expense by using the accessible applications based on the clouding offered by the cloud specialist organizations. This study aims to evaluate the factors that influence the adoption of CC for Higher Education within the Kurdistan Region in Iraq. The study was performed utilizing a non-experimental study exploratory research design. This exploratory study included an essential investigation into secondary data. The study development and modeling of secondary data to highlight the final results of the research. Through reviewing the literature of the existing frameworks in CC adoption, it is showed that there are limited institutions developed over the latest years. Moreover, HE in Kurdistan Region needs continued attention to get government support and redesign the educational system to cover all the core aspects in a better way. Here, at any time there is a need to access the applications, software and hardware, platform, and infrastructure; the most required is to have the internet service.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43975996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suspected Protective Effect of Eruca Sativa Leaves Extract on Sperm Abnormalities in Male Albino Mice Treated with Hypericum triqutrifolium aqueous crude extract","authors":"Chro Ghafoor Raouf, M. Ahmad","doi":"10.21928/uhdjst.v3n2y2019.pp87-92","DOIUrl":"https://doi.org/10.21928/uhdjst.v3n2y2019.pp87-92","url":null,"abstract":" \u0000 This study was carried out to evaluate the effect of Eruca sativa on the cytotoxic effect of Hypericum triquetrifolium on sperm abnormalities in albino mice. Leaves of E. sativa and aerial parts of H. triquetrifolium were dried in shade and grinded and their aqueous extracts were used for the treatments to study their effect on sperm morphology. Treated groups were injected with a single dose of 38 mg/kg body weight (BW) of Hypericum subcutaneously, while the Eruca groups were orally administered with 250 mg/kg BW twice/week for 2 weeks. After the exposure of H. triquetrifolium, the frequency of abnormal sperms showed a highly significant induction of sperm abnormalities; separated head from tail sperms, swollen head, hookless, defective head, and hook. However, the Eruca group showed no obvious abnormalities in sperm morphology, while in cotreatment with both Eruca and Hypericum (H/E) groups, there was an extremely significant decrease (P < 0.0001) in the abnormal sperms. In conclusion, it appeared that E. sativa could prevent or at least minimize the damages that Hypericum toxins would make on the sperm morphology significantly.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49281956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"empirical evaluation of metrics on aspect-oriented programs","authors":"M. Ghareb, Gary Allen","doi":"10.21928/uhdjst.v3n2y2019.pp74-86","DOIUrl":"https://doi.org/10.21928/uhdjst.v3n2y2019.pp74-86","url":null,"abstract":" \u0000 The quality evaluation of software metrics measurement is considered as the primary indicator of imperfection prediction and software maintenance in various empirical studies of software products. However, there is no agreement on which metrics are compelling quality pointers for new software development approaches such as aspect-oriented programming (AOP) techniques. AOP intends to enhance programming quality by providing fundamentally different parts of the systems, for example, pointcuts, advice, and intertype relationships. Hence, it is not evident if quality characteristics for AOP could be extracted from direct expansions of traditional object-oriented programming (OOP) measurements. Then again, investigations of AOP do regularly depend on established static and dynamic metrics measurement; notwithstanding the late research of AOP in empirical studies, few analyses been adopted using the International Organization for Standardization 9126 quality model as useful markers of flaw inclination in this context. This paper examination we have considered different programming quality models given by various authors every once in a while and distinguished that adaptability was deficient in the current model. We have testing 10 projects developed by AOP. We have used many applications to extract the metrics, but none of them could extract all AOP Metrics. It only can measure some of AOP Metrics, not all of them. This study investigates the suitable framework for extract AOP Metrics, for instance, static and dynamic metrics measurement for hybrid application systems (AOP and OOP) or only AOP application.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49202907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Interactive and Predictive Pre-diagnostic Model for Healthcare based on Data Provenance","authors":"Z. Ahmed, J. Hussien","doi":"10.21928/uhdjst.v3n2y2019.pp59-73","DOIUrl":"https://doi.org/10.21928/uhdjst.v3n2y2019.pp59-73","url":null,"abstract":"The future of healthcare may look completely different from the current clinic-center services. Rapidly growing and developing technologies are expected to change clinics throughout the world. However, the healthcare delivered to impaired patients, such as elderly and disabled people, possibly still requires hands-on human expertise. The aim of this study is to propose a predictive model that pre-diagnose illnesses by analyzing symptoms that are interactively taken from patients via several hand gestures during a period of time. This is particularly helpful in assisting clinicians and doctors to gain better understanding and make more accurate decisions about future plans for their patients’ situations. The hand gestures are detected, the time of the gesture is recorded and then they are associated to their designated symptoms. This information is captured in the form of provenance graphs constructed based on the W3C PROV data model. The provenance graph is analyzed by extracting several network metrics and then supervised machine-learning algorithms are used to build a predictive model. The model is used to predict diseases from the symptoms with a maximum accuracy of 84.5%.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41376995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elham Bahmani, A. Darwesh, Mojtaba Jamshidi, Somaieh Bali
{"title":"A Restricted Multipath Routing Algorithm in Wireless Sensor Networks Using a Virtual Cylinder: Bypassing Black hole and Selective Forwarding Attacks","authors":"Elham Bahmani, A. Darwesh, Mojtaba Jamshidi, Somaieh Bali","doi":"10.21928/UHDJST.V3N2Y2019.PP51-58","DOIUrl":"https://doi.org/10.21928/UHDJST.V3N2Y2019.PP51-58","url":null,"abstract":"In this paper, a simple and novel routing algorithm is presented to improve the packet delivery in harsh conditions such as selective forwarding and blackhole attacks to the wireless sensor networks. The proposed algorithm is based on restricted multi-path broadcast based on a virtual cylinder from the source node to the sink node. In this algorithm, when a packet is broadcast by a source node, a virtual cylinder with radius w is created from the source node to a sink node. All the nodes located in this virtual cylinder are allowed to forwardthe packet to the sink. Thus, data is forwarded to sink via multiple paths, but in a restricted manner so that the nodes do not consume a high amount of energy. If there are some compromised nodes in this virtual cylinder, the packets may be forwarded to the sink via other nodes of the virtual cylinder. The proposed algorithm is simulated and evaluated in terms of packet delivery rate and energy consumption. The experiment results show that the proposed algorithm increases packet delivery rate 7 times compared to the single-path routing method and reduces energy consumption up to three times compared to flooding routing method.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42942595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epileptic Seizure Detection using Deep Learning Approach","authors":"Sirwan Tofiq Jaafar, M. Mohammadi","doi":"10.21928/UHDJST.V3N2Y2019.PP41-50","DOIUrl":"https://doi.org/10.21928/UHDJST.V3N2Y2019.PP41-50","url":null,"abstract":"An epileptic seizure is a sign of abnormal activity in the human brain. Electroencephalogram (EEG) is a standard tool that has been used vastly for detection of seizure activities. Many methods have been developed to help the neurophysiologists to detect the seizure activities with high accuracy. Most of them rely on the features extracted in the time, frequency, or time-frequency domains. The performance of the proposed methods is related to the performance of the features extracted from EEG recordings. Deep neural networks enable learning directly on the data without the domain knowledge needed to construct a feature set. This approach has been hugely successful in almost all machine learning applications. We propose a new framework that also learns directly from the data, without extracting a feature set. We proposed an original deep-learning-based method to classify EEG recordings. The EEG signal is segmented into 4 s segments and used to train the long- and short-term memory network. The trained model is used to discriminate the EEG seizure from the background. The Freiburg EEG dataset is used to assess the performance of the classifier. The 5-fold cross-validation is selected for evaluating the performance of the proposed method. About 97.75% of the accuracy is achieved.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46595406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raheleh Hamedanizad, Elham Bahmani, Mojtaba Jamshidi, Aso Mohammad Darwesh
{"title":"Employing Data Mining Techniques for Predicting Opioid Withdrawal in Applicants of Health Centers","authors":"Raheleh Hamedanizad, Elham Bahmani, Mojtaba Jamshidi, Aso Mohammad Darwesh","doi":"10.21928/UHDJST.V3N2Y2019.PP33-40","DOIUrl":"https://doi.org/10.21928/UHDJST.V3N2Y2019.PP33-40","url":null,"abstract":" \u0000 Addiction to narcotics is one of the greatest health challenges in today’s world which has become a serious threat for social, economic, and cultural structures and has ruined a part of an active force of the society and it is one of the main factors of growth of diseases such as HIV and hepatitis. Today, addiction is known as a disease and welfare organization, and many of the dependent centers try to help the addicts treat this disease. In this study, using data mining algorithms and based on data collected from opioid withdrawal applicants referring to welfare organization, a prediction model is proposed to predict the success of opioid withdrawal applicants. In this study, the statistical population is comprised opioid withdrawal applicants in a welfare organization. This statistical population includes 26 features of 793 instances including men and women. The proposed model is a combination of meta-learning algorithms (decorate and bagging) and J48 decision tree implemented in Weka data mining software. The efficiency of the proposed model is evaluated in terms of precision, recall, Kappa, and root mean squared error and the results are compared with algorithms such as multilayer perceptron neural network, Naive Bayes, and Random Forest. The results of various experiments showed that the precision of the proposed model is 71.3% which is superior over the other compared algorithms.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49411425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Biometric Iris Recognition Based on Iris Localization Approach","authors":"M. Al-Ani","doi":"10.21928/UHDJST.V3N2Y2019.PP24-32","DOIUrl":"https://doi.org/10.21928/UHDJST.V3N2Y2019.PP24-32","url":null,"abstract":"Biometric recognition is an emerging technology that has attracted more attention in recent years. This issue uses physiological and behavioral characteristics to identify an individual. The iris recognition approaches are among the most accurate biometric technologies with immense potential for use in global security applications. The purpose of this research is to implement an efficient approach to treat the diseased eye images in order to verify the second iris examination for the same person by inserting an improvement step to the iris recognition system. This step makes a correction of boundary around pupil and removes fraction regions. This approach demonstrates its ability to detect the inner limit of the iris. The obtained results shows that 90% success in the detection diseased eye images, which makes the iris recognition system more accurate and safe.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48579952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The State of the Art in Feature Extraction Methods for EEG Classification","authors":"M. Mohammad, Hoger Mahmud Hussen","doi":"10.21928/UHDJST.V3N2Y2019.PP16-23","DOIUrl":"https://doi.org/10.21928/UHDJST.V3N2Y2019.PP16-23","url":null,"abstract":"Epileptic seizure is a neurological disease that is common around the world and there are many types (e.g. Focal aware seizures and atonic seizure) that are caused by synchronous or abnormal neuronal activity in the brain. A number of techniques are available to detect the brain activities that lead to Epileptic seizures; one of the most common one is Electroencephalogram (EEG) that uses visual scanning to measure brain activities generated by nerve cells in the cerebral cortex. The techniques make use of different features detected by EEG to decide on the occurrence and type of seizures. In this paper we review EEG features proposed by different researches for the purpose of Epileptic seizure detection, also analyze, and compare the performance of the proposed features.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48151956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blended Learning Mobility Approach and English Language Learning","authors":"M. Ghareb, S. Mohammed","doi":"10.21928/UHDJST.V3N2Y2019.PP1-9","DOIUrl":"https://doi.org/10.21928/UHDJST.V3N2Y2019.PP1-9","url":null,"abstract":"Although the benefits of blended learning have been well documented in educational research, relatively few studies have examined blended mobilities in education in Kurdistan region government and in Iraq. This study discusses a blended mobility approach for a teacher training program designed for in-service English language teachers (ELT) and investigates its effectiveness by comparing the latest participation of the University of Human Development for computer science and proposing the same program for training English for lecturers and students. The research involved proposes new mobility program for teaching and learning English language and using their language skills in an ongoing business project using several software for communication and management of their projects. Results will show the framework for new blended learning and blended mobilities of many different English language teaching (ELT) aspects.","PeriodicalId":32983,"journal":{"name":"UHD Journal of Science and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47001127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}