Skip to main content
Karwan  Jacksi
  • Zakho, Kurdistan Reg. of Iraq
  • +947504583908

Karwan Jacksi

  • B.Sc in Computer Science from the University of Duhok, M.Sc in Computer Science from Uppsala University, and Ph.D. in... more
    (B.Sc in Computer Science from the University of Duhok, M.Sc in Computer Science from Uppsala University, and Ph.D. in Computer Science from the University of Zakho. Also, I'm Lecturer at Computer Science Department, Faculty of Science, UoZ, and currently the director of ICT and Statistics Center)
    edit
Due to the availability of a vast amount of unstructured data in various forms (e.g., the web, social networks, etc.), the clustering of text documents has become increasingly important. Traditional clustering algorithms have not been... more
Due to the availability of a vast amount of unstructured data in various forms (e.g., the web, social networks, etc.), the clustering of text documents has become increasingly important. Traditional clustering algorithms have not been able to solve this problem because the semantic relationships between words could not accurately represent the meaning of the documents. Thus, semantic document clustering has been extensively utilized to enhance the quality of text clustering. This method is called unsupervised learning and it involves grouping documents based on their meaning, not on common keywords. This paper introduces a new method that groups documents from online laboratory repositories based on the semantic similarity approach. In this work, the dataset is collected first by crawling the short real-time descriptions of the online laboratories’ repositories from the Web. A vector space is created using frequency-inverse document frequency (TF-IDF) and clustering is done using th...
Visualization tools of ontology help users to understand the form of ontologies. There are an enormous number of tools used to visualize ontologies where most of them use graphical approaches to visualize ontology elements. The main aim... more
Visualization tools of ontology help users to understand the form of ontologies. There are an enormous number of tools used to visualize ontologies where most of them use graphical approaches to visualize ontology elements. The main aim of Visualization Notation for OWL Ontologies is to help users who are less familiar with ontologies to understand them. In this paper, a number of visualization tools have been studied in details, the ontology of E-learning Management System of Duhok Polytechnic University (ELMS-DPU) has been visualized using two different tools: protégé VOWL and finally, Web VOWL, a comparison between the two tools, is presented.
The amount of information on the web and it is unstructured nature. The order and structure of the information are very important. So, to reach this information in an easy way is to use an ontology for a specific domain. The word ontology... more
The amount of information on the web and it is unstructured nature. The order and structure of the information are very important. So, to reach this information in an easy way is to use an ontology for a specific domain. The word ontology used in many domains to organize web gain. The semantic web is considered as intelligent webs. This paper aims to investigate the ontology of the web which is one of the important technologies in the semantic web. The lack of use of the ontology in the Kurdistan region-Iraq universities made me develop an ontology for Duhok Polytechnic University (DPU) as a case study. The main aim of this paper is to develop an ontology of an E-learning Management System of Duhok Polytechnic University (ELMS-DPU) to rectify the existing problems in the university in Kurdistan region, including the lacking relationship between the need of the user and the content of the documents. The E-learning system consists of three main sections Admin, Lecturer, and Student. In this paper an ontology for ELMS-DPU has been designed, the architecture of ELMS-DPU is presented, and the ontology has been visualized using VOWL tool that has been a plugin with the protégé.
With the aim of designing and implementing a web-based article submission management system for academic research papers, several international models such as Elsevier Editorial System and ICOCI, International Conference on Computing and... more
With the aim of designing and implementing a web-based article submission management system for academic research papers, several international models such as Elsevier Editorial System and ICOCI, International Conference on Computing and Informatics, are studied and analyzed. Through this analysis, an open access web-based article submission and peer review system for Journal of University of Zakho (JUOZ) is employed. This kind of systems is not only capable of solving issues such as complex manuscript management, time-delays in the process of reviewing, and loss of manuscripts that occurs often in off-line paper submission and review processes, but also is capable to build the foundation for e-journal publications. Consequently, an active and rapid scholarly communication medium can be made. The implementation and deployment of this system can improve the rank of the university and the reputation and the globalization of science and technology research journals.
Abstract: In this research, the different teaching methodologies practiced in the basic database course taught in different universities are discussed. This paper was written based on researched conducted through a questionnaire about... more
Abstract: In this research, the different teaching methodologies practiced in the basic database course taught in different universities are discussed. This paper was written based on researched conducted through a questionnaire about university students in three different universities. The study was performed with a phenomenographic research approach among university staffs that have been graduated from University of
This paper considers the effects of the quantization error and Signal Quantization Noise Ratio (SQNR) on the performance of an Analog Digital Converter of the sine signal using the Truncating method to the nearest integer bit. This... more
This paper considers the effects of the quantization error and Signal Quantization Noise Ratio (SQNR) on the performance of an Analog Digital Converter of the sine signal using the Truncating method to the nearest integer bit. This Truncating method assigns each sample of the sine signal to the quantization level below it. By using MATLAB program, the experimental SQNRTruncating was always lower than the theoretical value as the number of bits increased in the digital word. This was expected because truncating the data leads to less accurate quantization of the signal and a lower SQNR. StatGraphics software was used to analyze simple regressions of the quantization error, and compare between Standard Deviation and Mean Absolute Deviation of the quantization error. StatGraph Plus program has been used to analyze the effect of the correlation coefficient statistic for truncating. Analysis Regression - Linear model using the StatGraph Plus program has been performed, then analysis of t...
According to the research published in the last decades, many peoples died due to natural disasters. So, some researchers tried to find a method and solution to reduce these disasters and risks. Lamentably, there is not any value system... more
According to the research published in the last decades, many peoples died due to natural disasters. So, some researchers tried to find a method and solution to reduce these disasters and risks. Lamentably, there is not any value system for a warning from certain dangerous disasters in the country. This suggestion is constructive to diagnose this kind of problem; every country follows different tactics. Based on the various sources of natural weather monitoring systems in the heterogeneous country regions, this review found no solution to warn the community in real-time. This examination is to find the weakness of the current situation as the growth of technology nowadays. Today mobile application's new technology helps an early alert system for natural disaster risk reduction (DRR) that authorities employed in several ways to reduce the natural disaster risks.
This study explores the usefulness of e-learning in teaching in secondary institutions. The topic of using new information and communication technology for teaching and learning is very relevant in secondary education institutions.... more
This study explores the usefulness of e-learning in teaching in secondary institutions. The topic of using new information and communication technology for teaching and learning is very relevant in secondary education institutions. Henceforth, Students can manage the most recent Technologies better. In addition, the School must play an important role to give instructional classes to the teacher to build up their aptitudes on the utilization of present-day advancements and to encourage downloading Eeducational module from the service's site. However, still there are deterrents with the application: First, right off the bat the substance of the educational programs is not perfect with E-learning. Second, shortcoming of the mechanical framework important for the foundation of the E-learning framework in general optional school. Third, low attention to understudies and educators about the significance of E-learning and absence of sufficient capability for chiefs and instructors wher...
In the recently developed document clustering, word embedding has the primary role in constructing semantics, considering and measuring the times a specific word appears in its context. Word2vect and Glove word embedding are the two most... more
In the recently developed document clustering, word embedding has the primary role in constructing semantics, considering and measuring the times a specific word appears in its context. Word2vect and Glove word embedding are the two most used word embeddings in document clustering. Previous works do not consider the use of glove word embedding with DBSCAN clustering algorithm in document clustering. In this work, a preprocessing with and without stemming of Wikipedia and IMDB datasets applied to glove word embedding algorithm, then word vectors as a result are applied to the DBSCAN clustering algorithm. For the evaluation of experiments, seven metrics have been used: Silhouette average, purity, accuracy, F1, completeness, homogeneity, and NMI score. The experimental results are compared with the results of TFIDF and K-means algorithms on six datasets. The results of this work outperform the results of the TFIDF and K-means approach using the four main evaluation metrics and CPU time...
Nowadays in the age of technology, textual documents are rapidly growing over the internet. Offline and online documents, websites, e-mails, social network and blog posts, are archived in electronic structured databases. It is very hard... more
Nowadays in the age of technology, textual documents are rapidly growing over the internet. Offline and online documents, websites, e-mails, social network and blog posts, are archived in electronic structured databases. It is very hard to maintain and reach these documents without acceptable ranking and provide demand clustering while there is classification without any details. This paper presents an approach based on semantic similarity for clustering documents using the NLTK dictionary. The procedure is done by defining synopses from IMDB and Wikipedia datasets, tokenizing and stemming them. Next, a vector space is constructed using TFIDF, and the clustering is done using the ward's method and K-mean algorithm. WordNet is also used to semantically cluster documents. The results are visualized and presented as an interactive website describing the relationship between all clusters. For each algorithm three scenarios are considered for the implementations: 1) without preproces...
Nowadays, cybersecurity threat is a big challenge to all organizations that present their services over the Internet. Distributed Denial of Service (DDoS) attack is the most effective and used attack and seriously affects the quality of... more
Nowadays, cybersecurity threat is a big challenge to all organizations that present their services over the Internet. Distributed Denial of Service (DDoS) attack is the most effective and used attack and seriously affects the quality of service of each E-organization. Hence, mitigation this type of attack is considered a persistent need. In this paper, we used Network Load Balancing (NLB) and High Availability Proxy (HAProxy) as mitigation techniques. The NLB is used in the Windows platform and HAProxy in the Linux platform. Moreover, Internet Information Service (IIS) 10.0 is implemented on Windows server 2016 and Apache 2 on Linux Ubuntu 16.04 as web servers. We evaluated each load balancer efficiency in mitigating synchronize (SYN) DDoS attack on each platform separately. The evaluation process is accomplished in a real network and average response time and average CPU are utilized as metrics. The results illustrated that the NLB in the Windows platform achieved better performanc...
There are many technologies which are used on the Internet to share files, each of them have different features, methods and protocols. However, the most common and easiest one is the Web which was established by few simple features. The... more
There are many technologies which are used on the Internet to share files, each of them have different features, methods and protocols. However, the most common and easiest one is the Web which was established by few simple features. The Web continuously developing to be as much as easy for the users. The Web developers want to make a machine which thinks like humans by adding new tools, methods and protocols to the current Web. This paper focuses on the most widely used technologies in the Web, and presents the stages of the development of the World Wide Web. Moreover, the evolution of the Web from Web1.0 to Web3.0 and semantic web is revealed. The paper, in addition, explains the technologies and tools of the Web and compares between Web portals and search engines. Finally, assessment of the activation period for each one is presented.
Indexing data plays a key role in data retrieval and search. New indexing techniques are proposed frequently to improve search performance. Some data clustering methods are previously used for data indexing in data warehouses. In this... more
Indexing data plays a key role in data retrieval and search. New indexing techniques are proposed frequently to improve search performance. Some data clustering methods are previously used for data indexing in data warehouses. In this paper, we discuss general concepts of data indexing, and clustering methods that are based on representatives. Then we present a general theme for indexing using clustering methods. There are two main processing schemes in databases, Online Transaction Processing (OLTP) and Online Analytical Processing (OLAP). The proposed method is specific to stationary data like in OLAP. Having general indexing theme, different clustering methods are compared. Here we studied three representative based clustering methods; standard K-Means, Self Organizing Map (SOM) and Growing Neural Gas (GNG). Our study shows that in this context, GNG out performs K-Means and SOM.
The steady success of the Internet has led to an enormous rise in the volume of electronic text records. Sensitive tasks are increasingly being used to organize these materials in meaningful bundles. The standard clustering approach of... more
The steady success of the Internet has led to an enormous rise in the volume of electronic text records. Sensitive tasks are increasingly being used to organize these materials in meaningful bundles. The standard clustering approach of documents was focused on statistical characteristics and clustering using the syntactic rather than semantic notion. This paper provides a new way to group documents based on textual similarities. Text synopses are found, identified, and stopped using the NLTK dictionary from Wikipedia and IMDB datasets. The next step is to build a vector space with TFIDF and cluster it using an algorithm K-mean. The results were obtained based on three proposed scenarios: 1) no treatment. 2) preprocessing without derivation, and 3) Derivative processing. The results showed that good similarity ratios were obtained for the internal evaluation when using (txt-sentoken data set) for all K values. In contrast, the best ratio was obtained with K = 20. In addition, as an e...
The fact that the existing Web allows people to effortlessly share data over the Internet has resulted in the accumulation of vast amounts of information available on the Web.Therefore, a powerful search technology that will allow... more
The fact that the existing Web allows people to effortlessly share data over the Internet has resulted in the accumulation of vast amounts of information available on the Web.Therefore, a powerful search technology that will allow retrieval of relevant information is one of the main requirements for the success of the Web which is complicated further due to use of many different formats for storing information. Semantic Web technology plays a major role in resolving this problem by permitting the search engines to retrieve meaningful information. Exploratory search system, a special information seeking and exploration approach, supports users who are unfamiliar with a topic or whose search goals are vague and unfocused to learn and investigate a topic through a set of activities. In order to achieve exploratory search goals Linked Open Data (LOD) can be used to help search systems in retrieving related data, so the investigation task runs smoothly.This paper provides an overview of ...
The fact that the existing Web allows people to effortlessly share data over the Internet has resulted in the accumulation of vast amounts of information available on the Web. Therefore, a powerful search technology that will allow... more
The fact that the existing Web allows people to effortlessly share data over the Internet has resulted in the accumulation of vast amounts of information available on the Web. Therefore, a powerful search technology that will allow retrieval of relevant information is one of the main requirements for the success of the Web which is complicated further due to use of many different formats for storing information. Semantic Web technology has a prominent role in search engines to alleviate this issue by providing a way to understand the contextual meaning of data so as to retrieve relevant, high-quality results.Exploratory search system, a special information seeking and exploration approach, supports users who are unfamiliar with a topic or whose search goals are vague and unfocused to learn and investigate a topic through a set of activities. In order to achieve exploratory search goals, Linked Data can be used to help search systems in retrieving related data, so the investigation t...
Enterprise systems have a clear role in the market processes, especially e-business systems which play basic role in the world today, with presence of technological evolution many recent technologies appeared which can serve e-business... more
Enterprise systems have a clear role in the market processes, especially e-business systems which play basic role in the world today, with presence of technological evolution many recent technologies appeared which can serve e-business trend such as Internet of Things (IoT), cloud computing and virtual marketplace engineering, which facilitate general enterprise system e-business and e-commerce jobs such as: (buying products in easy way, rapid service delivery to the clients, online responding to the customers’ requests with effective cost, etc), but with rapid marketplace changing and turbulent environment and increasing pressure from stake-holders, it is crucial key for companies to be implemented with high flexibility for competitive issues. These enterprises have to react to these unpredictable changes and provide appropriate services to the customers with minimum cost and time without needing to rebuild the entire system from the start, i.e. this can lead to more time and budge...
In this paper the applications of Shared Memory systems towards the implementation of the Parallel Processing approach is provided. Multiple tasks can be dealt with the applications of such systems by using the principles of Shared Memory... more
In this paper the applications of Shared Memory systems towards the implementation of the Parallel Processing approach is provided. Multiple tasks can be dealt with the applications of such systems by using the principles of Shared Memory Parallel Processing programming called Application-Program. The influences of forcing processes amongst processes of Shared Memory system relying on Parallel Processing approach principals are given. These influences are related with computing total and CPU execution times. The CPU usage is also determined with its changing manner depending on the load size and the number of participated CPUs.
The present invention provides a student attendance management system, which comprises a registration module, a statistics module, a management module and a reminding module, wherein the registration module is used for registering student... more
The present invention provides a student attendance management system, which comprises a registration module, a statistics module, a management module and a reminding module, wherein the registration module is used for registering student signing situations, the statistics module is used for carrying out statistics on the signing situations of each student according to a set time so as to obtain the absenteeism numbers of each student, the management module is used for comparing the absenteeism numbers of the students to a set absenteeism threshold one by one, and transmitting a reminding command to the reminding module if the absenteeism number of the student is more than or equal to the absenteeism threshold, and the reminding module is used for transmitting a reminder to a corresponding student terminal according to the reminding command. According to the present invention, the student attendance management system can establish the data interconnection with the student terminal, ...
Semantic similarity is the process of identifying relevant data semantically. The traditional way of identifying document similarity is by using synonymous keywords and syntactician. In comparison, semantic similarity is to find similar... more
Semantic similarity is the process of identifying relevant data semantically. The traditional way of identifying document similarity is by using synonymous keywords and syntactician. In comparison, semantic similarity is to find similar data using meaning of words and semantics. Clustering is a concept of grouping objects that have the same features and properties as a cluster and separate from those objects that have different features and properties. In semantic document clustering, documents are clustered using semantic similarity techniques with similarity measurements. One of the common techniques to cluster documents is the density-based clustering algorithms using the density of data points as a main strategic to measure the similarity between them. In this paper, a state-of-the-art survey is presented to analyze the density-based algorithms for clustering documents. Furthermore, the similarity and evaluation measures are investigated with the selected algorithms to grasp the...
Background and Aim: The World Health Organization (WHO) declared the novel coronavirus infection COVID-19 as a pandemic on March 11, 2020. Adherence to infection control measures is potentially influenced by people's knowledge,... more
Background and Aim: The World Health Organization (WHO) declared the novel coronavirus infection COVID-19 as a pandemic on March 11, 2020. Adherence to infection control measures is potentially influenced by people's knowledge, attitudes, and practices (KAP) about the infection. This project was performed to assess the KAP toward COVID-19 of university students in Kurdistan Region, Iraq. Materials and Methods: An online cross-sectional study was performed in April 2020 to evaluate KAP about coronavirus infection among university students in Kurdistan Region, Iraq. A total of 1959 students were recruited in this study and ages ranged from 18 to 55 years old. Results: Among the respondents, 55.03% were female, 93.8% were from Duhok province, and the majority of participants (93.4%) were undergraduate students. The overall correct answer rate of the knowledge questions toward COVID-19 was 75.8% with an average score of 9.1 ± 2.1 SD out of 12. Participants showed better knowledge of...
Since the last decade, Internet users increased rapidly and most of them are depending on the World Wide Web (WWW) service for achieving daily routine. Having Internet access and especially WWW sometimes users face difficulties because of... more
Since the last decade, Internet users increased rapidly and most of them are depending on the World Wide Web (WWW) service for achieving daily routine. Having Internet access and especially WWW sometimes users face difficulties because of various security problems. The most dangerous and serious threats that make Internet services impossible is Denial of Service (DoS) and its severe type ‘Distributed Denial of Service (DDoS)’. In this paper, the performance of different web servers in Network Load Balancing (NLB), cluster-based and none clustered are analyzed. Furthermore, we evaluate the impact of TCP SYN flood attack with massive concurrent HTTP load traffic on web server’s average response time, throughput and average CPU usage. The results show that Internet Information Service 10.0 (IIS10.0) on Windows server 2016 is more vulnerable to attacks compared to Apache2 on Ubuntu 16.04. The results also show that the IIS10.0 NLB clustered web servers is the most suitable mechanism for...
Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need... more
Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need managing and scheduling these services. The principal idea behind the scheduling is to minimize loss time, workload, and maximize throughput. So, the scheduling task is essential to achieve accuracy and correctness on task completion. This paper gives an idea about various task scheduling algorithms in the cloud computing environment used by researchers. Finally, many authors applied different parameters like completion time, throughput, and cost to evaluate the system.
In this paper, we present a discussion panel of two of the hottest topics in this area namely distributed parallel processing and distributed cloud computing. Various aspects have been discussed in this review paper such as concentrating... more
In this paper, we present a discussion panel of two of the hottest topics in this area namely distributed parallel processing and distributed cloud computing. Various aspects have been discussed in this review paper such as concentrating on whether these topics are discussed simultaneously in any previous works. Other aspects that have been reviewed in this paper include the algorithms, which simulated in both distributed parallel computing and distributed cloud computing. The goal is to process the tasks over resources then readjusted the calculation among the servers for the sake of optimization. These help us to improve the system performance with the desired rates. During our review, we presented some articles which explain the designing of applications in distributed cloud computing while some others introduced the concept of decreasing the response time in distributed parallel computing.
Nowadays, continuously accessing Internet services is vital for the most of people. However, due to Denial of Service (DoS) and its severe type ‘Distributed Denial of Service (DDoS), online services becomes unavailable to users in... more
Nowadays, continuously accessing Internet services is vital for the most of people. However, due to Denial of Service (DoS) and its severe type ‘Distributed Denial of Service (DDoS), online services becomes unavailable to users in sometimes. Rather than DDoS is dangerous and has serious impact on the Internet consumers, there are multiple types of that attack such Slowrise, ping of death and UDP, ICMP, SYN flood, etc. In this paper, the effect of HTTP and SYN flood attack on the most recent and widely used web servers is studied and evaluated. Systematic performance analysis is performed on Internet Information Service 10.0 (IIS 10.0) on Windows server 2016 and Apache 2 on Linux Ubuntu 16.04 Long Term Support (LTS) server. Furthermore, the key metrics of the performance are average response time, average CPU usage and standard deviation as a responsiveness, efficiency and stability of the web servers. The results show that the IIS10.0 outperformed Apache2 web server in efficiency and responsiveness during HTTP flood attack. However, Apache2 web server achievement was more responsive and performed more stability with SYN flood attack.
According to the W3C, the semantic web is the future of the www. The data that is based on the semantic web can be understood by machines and devices. The main component of the semantic web is the ontology, which is known as the backbone... more
According to the W3C, the semantic web is the future of the www. The data that is based on the semantic web can be understood by machines and devices. The main component of the semantic web is the ontology, which is known as the backbone of the semantic web. There are many tools used to edit and create an ontology, however, few kinds of research construct an ontology using oriented programming. SPARQL and API OWL are used to access and edit ontologies, though they are not using oriented programming. The main objective of this paper is to build an ontology using oriented programming and allowable to access OWL entities. Owlready module is effectively used in sport ontology for football in 11 European Leagues.
The quantity of data published on the Web according to principles of Linked Data (LD) is increasing intensely. However, this data is still largely limited to be used up by domain professionals and users who understand LD technologies.... more
The quantity of data published on the Web according to principles of Linked Data (LD) is increasing intensely. However, this data is still largely limited to be used up by domain professionals and users who understand LD technologies. Therefore, it is essential to develop tools to enhance intuitive perceptions of LD for lay users. The features of LD point to various challenges for an easy-to-use data presentation. In this research, the technical details behind the LOD Explorer, which is a tool for exploring the Web of Data, is presented, the efficiency and scalability of the system has been tested using several different platforms, and the results of experiments indicated an outstanding performance.
Within the Analog to Digital Conversion (ADC), quantization noise is a duplicate of a Quantization Error (QE) which is introduced by quantization. In signal processing and telecommunication systems, the noise is non-linear and depends on... more
Within the Analog to Digital Conversion (ADC), quantization noise is a duplicate of a Quantization Error (QE) which is introduced by quantization. In signal processing and telecommunication systems, the noise is non-linear and depends on the signal type. During the analog, Sine signal converts to the digital (ADC) process, the two methods are used Rounding and Truncating in-order to eliminate the error produced in the digitization process. The rounding method quantize assigns each sample of sine signal to the nearest quantization level. However, making the Truncating would have assigned each sample of sine signal to the quantization level below it. This paper compares the rounding and truncating methods of QE for sine signal, signal to quantization noise ratio, correlation coefficient, and regression equation of a line for both methods. Then, it calculates the residual sum of squares and compares it to the regression equations of the lines.
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method... more
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This article introduces a new method for grouping documents based on semantic similarity. This process is accomplished by identifying document summaries from Wikipedia and IMDB datasets, then deriving them using the NLTK dictionary. A vector space afterward is modeled with TFIDF, and the clustering is performed using the HAC and K-mean algorithms. The results are compared and visualized as an interactive webpage.
Background: The impact of COVID-19 on mental health outcomes of medical residency is an important concern. Currently, evidence regarding this issue is not sufficient. Objectives: The current study aimed to demonstrate the impact of the... more
Background: The impact of COVID-19 on mental health outcomes of medical residency is an important concern. Currently, evidence regarding this issue is not sufficient. Objectives: The current study aimed to demonstrate the impact of the COVID-19 pandemic on residency training programs as well as its psychological consequences for both individuals and their families in the Kurdistan Region, Iraq. Methods: This online cross-sectional study was performed at the Kurdistan Region, Iraq, from 12 - 25 August 2020. In total, 275 residents participated. Data were collected online, and the items were sent through specific Facebook and Viber groups of residents. Data were analyzed using descriptive statistics (i.e., frequency and percentage). Besides, the Chi-square and Fisher's exact test were used to compare the participants based on their sociodemographic characteristics. Results: Of 275 participants, 50.9% were female and mostly older than 30 years (52.4%). Surgical (36.4%) was the most...
Semantic analysis is an essential feature of the NLP approach. It indicates, in the appropriate format, the context of a sentence or paragraph. Semantics is about language significance study. The vocabulary used conveys the importance of... more
Semantic analysis is an essential feature of the NLP approach. It indicates, in the appropriate format, the context of a sentence or paragraph. Semantics is about language significance study. The vocabulary used conveys the importance of the subject because of the interrelationship between linguistic classes. In this article, semantic interpretation is carried out in the area of Natural Language Processing. The findings suggest that the best-achieved accuracy of checked papers and those who relied on the Sentiment Analysis approach and the prediction error is minimal.
Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need... more
Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need managing and scheduling these services. The principal idea behind the scheduling is to minimize loss time, workload, and maximize throughput. So, the scheduling task is essential to achieve accuracy and correctness on task completion. This paper gives an idea about various task scheduling algorithms in the cloud computing environment used by researchers. Finally, many authors applied different parameters like completion time, throughput, and cost to evaluate the system.
Semantic similarity is the process of identifying relevant data semantically. The traditional way of identifying document similarity is by using synonymous keywords and syntactician. In comparison, semantic similarity is to find similar... more
Semantic similarity is the process of identifying relevant data semantically. The traditional way of identifying document similarity is by using synonymous keywords and syntactician. In comparison, semantic similarity is to find similar data using meaning of words and semantics. Clustering is a concept of grouping objects that have the same features and properties as a cluster and separate from those objects that have different features and properties. In semantic document clustering, documents are clustered using semantic similarity techniques with similarity measurements. One of the common techniques to cluster documents is the density-based clustering algorithms using the density of data points as a main strategic to measure the similarity between them. In this paper, a state-of-the-art survey is presented to analyze the density-based algorithms for clustering documents. Furthermore, the similarity and evaluation measures are investigated with the selected algorithms to grasp the...
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most... more
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most businesses are using technology for daily basis tasks. However, it still is not used all over the world. In Kurdistan Region-Iraq (KRI), most of the SMEs still use the old way of working and follow the paper-based method for their daily basis tasks. According to a survey, more than seventy percent of SMEs in Kurdistan are not using software to manage human resource management tasks. However, some big companies are using HRMS; but even then, there is a lack of use of Cloud Technology. In this study, a model of the Enterprise Human Resource Management System (EHRMS) is proposed and implemented to solve the HR problems in this area using Cloud Technology. The proposed system consists of sixteen standard modules which used usually with famous HRM systems....
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most... more
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most businesses are using technology for daily basis tasks. However, it still is not used all over the world. In Kurdistan Region-Iraq (KRI), most of the SMEs still use the old way of working and follow the paper-based method for their daily basis tasks. According to a survey, more than seventy percent of SMEs in Kurdistan are not using software to manage human resource management tasks. However, some big companies are using HRMS; but even then, there is a lack of use of Cloud Technology. In this study, a model of the Enterprise Human Resource Management System (EHRMS) is proposed and implemented to solve the HR problems in this area using Cloud Technology. The proposed system consists of sixteen standard modules which used usually with famous HRM systems....
Introduction: The capacity of hospitals to provide services and training has suffered a remarkable setback as a result of the ongoing COVID-19 pandemic. The magnitude of this negative impact and measures deployed to ensure continued... more
Introduction: The capacity of hospitals to provide services and training has suffered a remarkable setback as a result of the ongoing COVID-19 pandemic. The magnitude of this negative impact and measures deployed to ensure continued provision of services (particularly surgical services) and training has become an active area of research. We examined the extent of disruption of surgical services as well as disposition of surgeons to surgical practice during the COVID-19 pandemic. The adoption of video conferencing as an alternative training platform was also assessed. Methods: The study was a cross-sectional survey of 105 consultant surgeons in Nigeria. It assessed their demographic information, changes in surgical practice and training (academic) activities during the pandemic. Results: Generally, there was an overall reduction in the number of elective and emergency surgical cases during the pandemic although the decline in elective cases was more remarkable with 73.3% of the respo...
Research Interests:

And 22 more

Among many P2P file-sharing protocols in existence, BitTorrent is one of the few that has attracted significant attention by a wide range of users. It uses variety of algorithms for peer selection, piece selection and other tasks. Having... more
Among many P2P file-sharing protocols in existence, BitTorrent is one of the few that
has attracted significant attention by a wide range of users. It uses variety of
algorithms for peer selection, piece selection and other tasks.
Having a simulator that facilitates investigating of applying different strategies in
implementing components of a P2P would be of great advantages.
An Erlang based BitTorrent simulator was developed by IT department at Uppsala
university. The network side of the project had been rewritten in order to improve
the functionality of the application. In this thesis work, a new and modular design
approach for the client side of the implementation was employed, documented and
incorporated into the application.
All nodes run in parallel, and they communicate with each other through the newly
developed network module. A variety of options for the BitTorrent simulator are
supported in the implementation, algorithms of the typical structure can easily be
exchanged and used to experiment new ideas to find out how the swarm is affected
by different approaches in implementing BitTorrent clients and trackers.
The report also reviews the structure of the previous thesis work, and explains the
modifications made to the previously developed network module.
Research Interests: