Search Results - "Iraqi Journal for Computer Science and Mathematics"

Refine Results
  1. 1

    Has the Future Started? The Current Growth of Artificial Intelligence, Machine Learning, and Deep Learning by Karan Aggarwal, Maad M. Mijwil, Sonia, Abdel-Hameed Al-Mistarehi, Safwan Alomari, Murat Gök, Anas M. Zein Alaabdin, Safaa H. Abdulrhman

    “…In the modern era, many terms related to artificial intelligence, machine learning, and deep learning are widely used in domains such as business, healthcare,…”
    Get full text
    Journal Article
  2. 2

    Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime by Maad Mijwil, Mohammad Aljanabi, ChatGPT

    “…Today, cybersecurity is considered one of the most noteworthy topics that are circulated frequently among companies in order to protect their data from hacking…”
    Get full text
    Journal Article
  3. 3

    Decision-making techniques based on similarity measures of possibility interval fuzzy soft environment by Faisal Al-Sharqi, Ashraf Al-Quran, Mamika Ujianita Romdhini

    “…The fuzzy set (FS) is a powerful logic designed to measure uncertain information and plays a crucial role in solving real-life problems such as…”
    Get full text
    Journal Article
  4. 4

    Artificial Intelligence in Education: Mathematics Teachers’ Perspectives, Practices and Challenges by Wardat, Yousef, Tashtoush, Mohammad, Alali, Rommel, Saleh, Shoeb

    “… Efforts have been made to include artificial intelligence (AI) in teaching and learning; nevertheless,the successful deployment of new instructional…”
    Get full text
    Journal Article
  5. 5

    Analyzing the User's Sentiments of ChatGPT Using Twitter Data by ADEM KORKMAZ, CEMAL AKTÜRK, TARIK TALAN

    “…ChatGPT, an advanced language model based on artificial intelligence developed by the OpenAI, was released to internet users on November 30, 2022, and has…”
    Get full text
    Journal Article
  6. 6

    Metaverse: open possibilities by Mohammad Aljanabi, Sahar Yousif Mohammed

    “…To create a completely immersive, highly spatiotemporal, and self-sustaining virtual shared place for humans to play, work, and interact, the Metaverse is an…”
    Get full text
    Journal Article
  7. 7

    SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs by Atheel Sabih Shaker, Omar F. Youssif, Mohammad Aljanabi, ZAINAB ABBOOD, Mahdi S. Mahdi

    “…The mobile wireless sensor network (WSN) is an emerging field as it widens the scope of applications where sensor networks can be applied. Generally, mobility…”
    Get full text
    Journal Article
  8. 8

    The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review by Maad Mijwil, Israa Ezzat Salem, Marwa M. Ismaeel

    “…People in the modern era spend most of their lives in virtual environments that offer a range of public and private services and social platforms. Therefore,…”
    Get full text
    Journal Article
  9. 9

    Improving Process Efficiency in Iraqi universities: a proposed management information system by Mohanad Yaseen, Hayder Sabah Salih, Mohammad Aljanabi, Ahmed Hussein Ali, Saad Abas Abed

    “…This research paper aims to investigate the current state of process efficiency in Iraqi universities and propose a management information system (MIS) to…”
    Get full text
    Journal Article
  10. 10

    Enhancing Student's Performance Classification Using Ensemble Modeling by Nafea, Ahmed Adil, Mishlish, Muthanna, Shaban, Ali Muwafaq Shaban, AL-Ani, Mohammed M, Alheeti, Khattab M Ali, Mohammed, Hussam J.

    “… A precise prediction of student performance is an important aspect within educational institutions toimprove results and provide personalized support of…”
    Get full text
    Journal Article
  11. 11

    Proposed a New Framework Scheme for the PATH LOSS in Wireless Body Area Network by Israa Al_Barazanchi, Yitong Niu, Haider Rasheed Abdulshaheed, Wahidah Hashim, Ammar Ahmed Alkahtani, Elika Daghighi, Zahraa A. Jaaz, Shihab A. Shawkat, Hafiz Tayyab Rauf

    “…Recent technical developments in wi-fi networking, microelectronic integration and programming, sensors, and the Internet have enabled us to create and enforce…”
    Get full text
    Journal Article
  12. 12

    Blockchain Technology - Based Solutions for IOT Security by Israa Al_Barazanchi, Aparna Murthy, Ahmad AbdulQadir Al Rababah, Ghadeer Khader, Haider Rasheed Abdulshaheed, Hafiz Tayyab Rauf, Elika Daghighi, Yitong Niu

    “…Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its…”
    Get full text
    Journal Article
  13. 13

    Enhancing the Zebra Optimization Algorithm with Chaotic Sinusoidal Map for Versatile Optimization by DAMA, ANAND, Osamah Ibrahim Khalaf, G Rajesh Chandra

    “…In this study, the Chaotic Sinusoidal Map (CSM)-enhanced Zebra Optimization Algorithm (CZOA)is introduced. CZOA combines CSM's integration strengths with ZOA's…”
    Get full text
    Journal Article
  14. 14

    A Survey of Intrusion Detection Using Deep Learning in Internet of Things by baraa I. Farhan, Ammar D.Jasim

    “…The use of deep learning in various models is a powerful tool in detecting IoT attacks, identifying new types of intrusion to access a better secure network…”
    Get full text
    Journal Article
  15. 15

    An Integrative Computational Intelligence for Robust Anomaly Detection in Social Networks by Suresh, Helina Rajini, Reddy, Vallem Ranadheer, K, Sangamithrai, Praveena, Hirald Dwaraka, C, Gnanaprakasam, C, Sakthi Lakshmi Priya

    “…Anomaly detection is very important in social networks to keep the truth, security and believability of online communities. This paper presents Adapto Detect…”
    Get full text
    Journal Article
  16. 16

    Impact of Chat GPT on Scientific Research: Opportunities, Risks, Limitations, and Ethical Issues by Omar Ibrahim Obaid, Ahmed Hussein Ali, Mohanad Ghazi Yaseen

    “…The creation of chatbots, such as Generative Pre-trained Transformer (GPT), is a result of recent developments in natural language processing (NLP). Even…”
    Get full text
    Journal Article
  17. 17

    Formulating an Advanced Security Protocol for Internet of Medical Things based on Blockchain and Fog Computing Technologies by Razaq, Rasha halim

    “… The Internet of Medical Things (IoMT) is an evolving field in healthcare that connects medicaldevices to the Internet to enable efficient data sharing and…”
    Get full text
    Journal Article
  18. 18

    Development of synthetic data generator for ornament based on data mining techniques by Dheyab, Saad Ahmed, Hameed, Rasha Talal, Ali, Ahmed Hussein

    “…Artificial intelligence tools depend on generating various images on the available datasets, but there is a lot of data that is not completely available,…”
    Get full text
    Journal Article
  19. 19

    Improves Intrusion Detection Performance In Wireless Sensor Networks Through Machine Learning, Enhanced By An Accelerated Deep Learning Model With Advanced Feature Selection by Hadeel M. Saleh, Hend Marouane, Ahmed Fakhfakh

    “…Wireless Sensor Networks (WSNs) have been securing a big position in the new aspect of security network attacks, where these suffer from various serious cyber…”
    Get full text
    Journal Article
  20. 20

    Adaptive Heterogeneity Index Cloudlet Scheduler for Variable Workload and Virtual Machine Configuration by D, Gritto, P, Muthulakshmi

    “…In any service-based computing environment, performance pertains to the effectiveness of a system or application in managing user tasks. The key performance…”
    Get full text
    Journal Article