Iraqi Journal For Computer Science and Mathematics https://journal.esj.edu.iq/index.php/IJCM <table class="data" style="font-size: 0.875rem; height: 329px;" width="561" bgcolor="#f0f0f0"> <tbody> <tr valign="top"> <td width="30%"><strong>Journal title</strong></td> <td width="80%"><strong>Iraqi Journal for Computer Science and Mathematics </strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Indexing</strong></td> <td width="80%"><strong><a href="https://www.scopus.com/sourceid/21101124068">Scopus</a></strong></td> </tr> <tr valign="top"> <td width="30%"> <p><strong>Online ISSN</strong></p> <p><strong>Print ISSN</strong></p> </td> <td width="80%"> <p><strong>2788-7421</strong></p> <p><strong> <span class="fontstyle0">2958-0544</span> <br /></strong></p> </td> </tr> <tr valign="top"> <td width="30%"><strong>Frequency</strong></td> <td width="80%"><strong>4 issues per year</strong></td> </tr> <tr valign="top"> <td width="30%"> <p><strong>DOI</strong></p> </td> <td width="80%"> <p><strong>prefix 10.52866</strong></p> </td> </tr> <tr valign="top"> <td width="30%"> <p><strong>Editor in Chief </strong></p> <p> </p> <p> </p> <p><strong>Editor in Chief </strong></p> <p> </p> <p> </p> <p><strong>Managing Editor</strong></p> </td> <td width="80%"> <p><strong><em><a href="https://orcid.org/0000-0002-6374-3560">Assist. Prof. Dr.Mohammad Aljanabi</a>, Full time editor at Iraqi Journal for Computer Science and Mathematics, College of Education, Al-Iraqia University, Iraq </em></strong></p> <p><strong><em> Email:mohammad.khaleel@aliraqia.edu.iq</em></strong></p> <p><a href="http://as-albahri.net/Career.html"><strong>Assoc. Prof.Ahmed Shihab Albahr</strong></a><strong><a href="https://scholar.google.com/citations?user=VOveIgkAAAAJ&amp;hl=en">i</a>, Iraqi Comission for Computers and Informatics, Iraq</strong></p> <p><strong><em>Email: ahmed.bahri1978@iips.icci.edu.iq</em></strong></p> <p><strong><a href="https://orcid.org/0000-0001-8312-2289">Assoc. Prof.Mohd Arfian Ismail</a>, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, Malaysia </strong></p> <p><strong><em>Email: arfian@ump.edu.my</em></strong></p> <p> </p> </td> </tr> <tr valign="top"> <td width="30%"><strong>Organized by</strong></td> <td width="80%"><strong>Department of Computer, College of Education, Al-Iraqia University, Iraq</strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Citation Analysis</strong></td> <td width="80%"><strong><a href="https://www-scopus-com.ezproxy.ump.edu.my/results/results.uri?sort=plf-f&amp;src=s&amp;st1=Iraqi+Journal+For+Computer+Science+and+Mathematics&amp;sid=79923ed8f98395bd8143dc21bf0c114b&amp;sot=b&amp;sdt=b&amp;sl=60&amp;s=SRCTITLE%28Iraqi+Journal+For+Computer+Science+and+Mathematics%29&amp;origin=searchbasic&amp;editSaveSearch=&amp;yearFrom=Before+1960&amp;yearTo=Present">Scopus</a> | <a href="https://scholar.google.com/citations?user=VnZI994AAAAJ&amp;hl=en&amp;authuser=1">Google Scholar</a></strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Acceptance Rate:</strong></td> <td width="80%"><strong>5%</strong></td> </tr> <tr valign="top"> <td width="30%"><strong>Review Speed:</strong></td> <td width="80%"><strong>90 days </strong></td> </tr> <tr valign="top"> <td width="30%"> </td> <td width="80%"> </td> </tr> </tbody> </table> <div> </div> <div><strong>Before submission</strong>,<br />You have to make sure that your paper is prepared using the<strong> <a href="https://journal.esj.edu.iq/index.php/IJCM/libraryFiles/downloadPublic/12">IJCSM paper Template</a>, or <a href="https://journal.esj.edu.iq/index.php/IJCM/libraryFiles/downloadPublic/16">Latex Template </a></strong>has been carefully proofread and polished and conformed to the<a href="https://journal.esj.edu.iq/index.php/IJCM/guide"> author guidelines</a>.<strong> </strong><br /> <div id="homepageImage"> </div> </div> <div id="tabs"><strong>Online Submissions</strong></div> <div> <ul> <li>Already have a username/password for Iraqi Journal for Computer Science and Mathematics? <a href="https://journal.esj.edu.iq/index.php/IJCM/login"><strong>GO TO LOGIN</strong></a> </li> <li>Need a username/password? <strong><a href="https://journal.esj.edu.iq/index.php/IJCM/user/register?source=">GO TO REGISTRATION </a></strong></li> </ul> </div> <div>Registration and login are required to submit items online and to check the status of current submissions. </div> <div> <p> </p> </div> College of Education/ Al-Iraqia University en-US Iraqi Journal For Computer Science and Mathematics 2958-0544 Homotopy analysis method for solving fuzzy Nonlinear Volterra integral equation of the second kind https://journal.esj.edu.iq/index.php/IJCM/article/view/1324 <p>This paper introduces the homotopy analytic HAM, an effective and reliable method for solving computationally challenging fuzzy Volterra nonlinear integral equations of the second type. Numerical examples are provide to demonstrate the accuracy of HAM. To check for existence and uniqueness, the study employs the Banach fixed point theory and homotopy analysis. Finally the study resolves our issue using the MAPLE programme. </p> Rana Hussein Moez Khenissi Copyright (c) 2024 Rana Hussein, Moez Khenissi https://creativecommons.org/licenses/by/4.0 2024-08-06 2024-08-06 5 3 428 440 10.52866/ijcsm.2024.05.03.026 Embedded Deep Learning to Improve the Performance of Approaches for Extinct Heritage Images Denoising https://journal.esj.edu.iq/index.php/IJCM/article/view/1725 <p>Many advanced deep convolutional neural network (DCNN) methods have proven their efficacy in reconstructing the texture of super-resolution images (SR) from low-resolution images (LR).&nbsp;&nbsp; Nevertheless, the objective of achieving super-resolution (SR) reconstruction using Deep Convolutional Neural Networks (DCNN) becomes difficult when the input image is distorted by noise.&nbsp; Photographs captured at the inception of the camera are presently regarded as a&nbsp;cultural heritage that chronicles an important period in human history; however, they are marred by low resolution and noise as a result of obsolescence and the primitive nature of the technology that captured them, in contrast to the technological advances that cameras benefit from today. We proposed embedded deep learning to improve the performance of approaches for extinct heritage images denoising to denoise and reconstruct Baghdad heritage images. First, stage super-resolution (SR) noisy image generation from low-resolution (LR) heritage noisy image aims to enable to extraction of noise features for the target images. Second, remove visible noise features on images and restore their surface texture, giving them a more modern and clearer scene while preserving their original identity. PSNR, SNR, and SSIM quantitative metrics and the visual comparison analysis between the proposed method and state-of-art methods: Total variation denoising (TV), Bilateral filter denoising (BF), Median filter Denoising (MF) Gaussian filter image denoise (GF), and Non-Local Bayes (NLB) denoising demonstrated a better performance in reducing noise from the target images and a high-frequency flow with more information. Our approach restores heritage in a way that mimics modern photographic scenes using deep learning algorithms.</p> Alaa HamzaOmran Ali Salim Rasheed Copyright (c) 2024 Alaa HamzaOmran, Ali Salim Rasheed https://creativecommons.org/licenses/by/4.0 2024-08-11 2024-08-11 5 3 526 534 10.52866/ijcsm.2024.5.03.033 Resource Allocation and Edge Computing for Dual Hop Communication in Satellite Assisted UAVs enabled VANETs https://journal.esj.edu.iq/index.php/IJCM/article/view/1480 <p>VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge Computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the UAVs.Through these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. From the results and discussion, it has been proven that the proposed RAEDH-SAVs attained maximum results in terms of energy efficiency, delivery ratio, and throughput.</p> Mustafa Maad Hamdi Sami Abduljabbar Rashid Ahmed Adil Nafea Copyright (c) 2024 Mustafa Maad Hamdi, Sami Abduljabbar Rashid, Ahmed Adil Nafea https://creativecommons.org/licenses/by/4.0 2024-06-13 2024-06-13 5 3 108 127 10.52866/ ijcsm.2024.05.03.006 Unlocking the Potential: Synergizing IoT, Cloud Computing, and Big Data for a Bright Future https://journal.esj.edu.iq/index.php/IJCM/article/view/955 <p>The convergence and integration of the Internet of Things (IoT), Cloud Computing (CC), and Big Data (BD) offer huge potential for transformative progress that will support the massive industrial revolution that is so prevalent in today’s digital landscape. This prompts an exploration of the synergies among these three domains and investigates how their integration can unlock new opportunities for a brighter future. This integration seamlessly connects billions of IoT devices, leverages the potential of CC, and efficiently manages vast datasets generated by these devices. The amalgamation of BD analytics with IoT and CC empowers organizations to extract invaluable insights, foster data-driven decision-making, and fuel innovation across diverse industries. Nevertheless, the incorporation of these systems also gives rise to notable difficulties, encompassing issues such as data protection, worries about privacy, the ability to scale, and the management of data. The paper delves into these challenges, explores strategies, and examines the hurdles and best practices to address them effectively through a comprehensive examination of the potential benefits, challenges, and mitigation strategies. In addition, this paper offers insights into how synergizing IoT, CC, and BD can pave the way for a brighter, more promising future in technology and society.</p> zeena alkateeb Dhuha Abdullah Copyright (c) 2024 zeena alkateeb, Dhuha Abdullah https://creativecommons.org/licenses/by/4.0 2024-06-10 2024-06-10 5 3 1 13 10.52866/ijcsm.2024.05.03.001 A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech https://journal.esj.edu.iq/index.php/IJCM/article/view/1534 <p>The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation, "financial technologies (FinTech), around the globe. However, the security of FinTech systems and networks remains critical. This research paper comprehensively reviews cybersecurity issues and their mitigation measures in FinTech. Four independent researchers reviewed relevant literature from IEEE Xplore, ScienceDirect, Taylor &amp; Francis, Emerald Insight, Springer, SAGE, WILEY, Hindawi, MDPI, ACM, and Google Scholar. The key findings of the analysis identified privacy issues, data breaches, malware attacks, hacking, insider threats, identity theft, social engineering attacks, distributed denial-of-service attacks, cryptojacking, supply chain attacks, advanced persistent threats, zero-day attacks, salami attacks, man-in-the-middle attacks, SQL injection, and brute-force attacks as some of the significant cybersecurity issues experienced by the FinTech industry. The review paper also suggested authentication and access control mechanisms, cryptography, regulatory compliance, intrusion detection and prevention systems, regular data backup, basic security training, big data analytics, use of artificial intelligence and machine learning, FinTech regulatory sandboxes, cloud computing technologies, blockchain technologies, and fraud detection and prevention systems as mitigation measures for cybersecurity issues. However, tackling cybersecurity issues will be paramount if FinTech is to realize its full potential. Ultimately, this research will help develop robust security mechanisms for FinTech systems and networks to achieve sustainable financial inclusion.</p> Guma Ali Maad M. Mijwil Bosco Apparatus Buruga Mostafa Abotaleb Copyright (c) 2024 Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, Mostafa Abotaleb https://creativecommons.org/licenses/by/4.0 2024-06-10 2024-06-10 5 3 45 91 10.52866/ijcsm.2024.05.03.004 New Structures of Soft Permutation in Commutative Q-algebras https://journal.esj.edu.iq/index.php/IJCM/article/view/1129 <p><img src="https://journal.esj.edu.iq/public/site/images/moataz/screenshot-302.png" alt="" width="811" height="251"></p> Moataz Sajid Sharqi Shuker khalil Copyright (c) 2024 Moataz Sajid Sharqi, Shuker khalil https://creativecommons.org/licenses/by/4.0 2024-07-15 2024-07-15 5 3 263 274 10.52866/ijcsm.2024.05.03.014 A Generating Distorted CAPTCHA Images Using a Machine Learning Algorithm https://journal.esj.edu.iq/index.php/IJCM/article/view/1701 <p> <span class="fontstyle0">CAPTCHAs (Completely Automated Public Turing Test to Tell Computers and Humans Apart)<br />have become universal in web security systems to differentiate between automated bots and human users. This<br />research presents a novel approach for generating and classifying distorted CAPTCHA images utilizing machine<br />learning techniques. The process involves developing a random text and rendering it onto an image, introducing<br />distortion for security. The proposed method involves developing CAPTCHA images by combining text rendering<br />and controlled distortion techniques. These images are then utilized to train a random forest classifier for accurate<br />recognition. A Random Forest classifier is employed to recognize the generated CAPTCHA images. Experimental<br />results demonstrate the approach's efficacy in achieving high validation accuracy. The validation accuracy of the<br />classifier demonstrates its effectiveness in deciphering distorted images. Thus addressing the challenge of creating<br />CAPTCHAs that are both human-readable and resistant to automated recognition.</span> </p> Saba Abdulbaqi Salman Yasmin Makki Mohialden Nadia Mahmood Hussien Copyright (c) 2024 Saba Abdulbaqi Salman , Yasmin Makki Mohialden , Nadia Mahmood Hussien https://creativecommons.org/licenses/by/4.0 2024-07-31 2024-07-31 5 3 10.52866/ijcsm.2024.05.03.023 Improving security in the 5G-based medical Internet of Things to improve the quality of patient services https://journal.esj.edu.iq/index.php/IJCM/article/view/1188 <p> <span class="fontstyle0">The Internet of Medical Things (IoMT) is like a tech upgrade that benefits patients by reducing healthcare<br />costs, making medical care more accessible, and improving the quality of treatment. To make IoMT devices smart and capable,<br />they need super-fast 5G support. However, there are security concerns when using IoMT devices that can put a patient's data<br />and privacy at risk. For instance, someone could eavesdrop on your medical data due to weak network access management and<br />data encryption. Many systems use encryption methods to protect data, but these methods often fall short when it comes to the<br />high security standards required for healthcare data and patient service quality. In our research, we introduce a new solution<br />called the Hybrid MD5 and Threefish Encryption (HMTE) to make IoMT more secure and improve the quality of care for<br />patients. To ensure efficient use of energy, we employ a smart approach when choosing a cluster head. When it comes to<br />sending data, we use the Trust-Based Energy Efficient Routing Protocol (TEERP). We carefully evaluate different aspects like<br />cost, encryption and decryption speed, and the level of security while analyzing our proposed method. We also compare our<br />solution with existing methods. Our data shows that our recommended solution outperforms existing methods, particularly in<br />terms of enhancing security to improve the quality of care for patients.</span> </p> israa albarazanchi Kholood J.Moulood Muneer Sameer Gheni Mansoor Jamal Fadhil Tawfeq Copyright (c) 2024 israa albarazanchi, Kholood J.Moulood, Muneer Sameer Gheni Mansoor, Jamal Fadhil Tawfeq https://creativecommons.org/licenses/by/4.0 2024-07-23 2024-07-23 5 3 305 313 10.52866/ijcsm.2024.05.03.017 Development of synthetic data generator for ornament based on data mining techniques https://journal.esj.edu.iq/index.php/IJCM/article/view/1728 <p>Artificial intelligence tools depend on generating various images on the available datasets, but there is a lot of data that is not completely available, especially images of heritage and archaeological ornament. In this paper, a tool was developed to generate ornament based on the geometric shapes of heritage ornaments. A group of basic geometric shapes was collected. The new ornament are reshaped in three stages, relying on the permutation equation and reshaping of the overlapping sizes of the shapes, In the first stage, the number of layers that make up the ornament is determined. In the second stage, the formation of the ornament is determined through rotation or mirroring. In the final stage, the set of ornaments is generated in the form of an integrated matrix.</p> Saad Ahmed Dheyab Rasha Talal Hameed Ahmed Hussein Ali Copyright (c) 2024 Saad Ahmed Dheyab, Rasha Talal Hameed, Ahmed Hussein Ali https://creativecommons.org/licenses/by/4.0 2024-08-31 2024-08-31 5 3 10.52866/ijcsm.2024.05.03.045 Convex Optimization Techniques for High-Dimensional Data Clustering Analysis: A Review https://journal.esj.edu.iq/index.php/IJCM/article/view/1276 <p> <span class="fontstyle0">Clustering techniques have been instrumental in discerning patterns and relationships within<br />datasets in data analytics and unsupervised machine learning. Traditional clustering algorithms struggle to handle<br />real-world data analysis problems where the number of clusters is not readily identifiable. Moreover, they face<br />challenges in determining the optimal number of clusters for high-dimensional datasets. Consequently, there is a<br />demand for enhanced, adaptable and efficient techniques. Convex clustering, rooted in a rich mathematical<br />framework, has steadily emerged as a pivotal alternative to traditional techniques. It amalgamates the strengths of<br />conventional approaches while ensuring robustness and guaranteeing globally optimal solutions. This review offers<br />an in-depth exploration of convex clustering, detailing its formulation, challenges and practical applications. It<br />examines synthetic datasets, which serve as foundational platforms for academic exploration, emphasizing their<br />interactions with the semi-smooth Newton augmented Lagrangian (SSNAL) algorithm. Convex clustering provides<br />a robust theoretical foundation, but challenges, including computational limitations with expansive datasets and<br />noise management in high-dimensional contexts, persist. Hence, the paper discusses current challenges and<br />prospective future directions in the domain. This research aims to illuminate the potency and potential of convex<br />clustering in modern data analytics, highlighting its robustness, flexibility and adaptability across diverse datasets<br />and applications.</span> </p> Ahmed Yacoub Yousif Copyright (c) 2024 Ahmed Yacoub Yousif https://creativecommons.org/licenses/by/4.0 2024-07-31 2024-07-31 5 3 10.52866/ijcsm.2024.05.03.022 Healthcare Privacy-Preserving Federated Transfer Learning using CKKS-Based Homomorphic Encryption and PYHFEL Tool https://journal.esj.edu.iq/index.php/IJCM/article/view/1362 <p> <span class="fontstyle0">Digitization of healthcare data has shown an urgent necessity to deal with privacy concerns within<br />the field of deep learning for healthcare organizations. A promising approach is federated transfer learning,<br />enabling medical institutions to train deep learning models collaboratively through sharing model parameters rather<br />than raw data. The objective of this research is to improve the current privacy-preserving federated transfer<br />learning systems that use medical data by implementing homomorphic encryption utilizing PYthon for<br />Homomorphic Encryption Libraries (PYFHEL). The study leverages a federated transfer learning model to classify<br />cardiac arrhythmia. The procedure begins by converting raw Electrocardiogram (ECG) scans into 2-D ECG<br />images. Then, these images are split and fed into the local models for extracting features and complex patterns<br />through a finetuned ResNet50V2 pre-trained model. Optimization techniques, including real-time augmentation<br />and balancing, are also applied to maximize model performance. Deep learning models can be vulnerable to<br />privacy attacks that aim to access sensitive data. By encrypting only model parameters, the Cheon-Kim-Kim-Song<br />(CKKS) homomorphic scheme protects deep learning models from adversary attacks and prevents sensitive raw<br />data sharing. The aggregator uses a secure federated averaging method that averages encrypted parameters to<br />provide a global model protecting users’ privacy. The system achieved an accuracy rate of 84.49% when evaluated<br />using the MIT-BIH arrhythmia dataset. Furthermore, other comprehensive performance metrics were computed to<br />gain deeper insights, including a precision of 72.84%, recall of 51.88%, and an F1-score of 55.13%, reflecting a<br />better understanding of the adopted framework. Our findings indicate that employing the CKKS encryption scheme<br />in a federated environment with transfer cutting-edge technology achieves relatively high accuracy but at the cost<br />of other performance metrics, which is lower in the encrypted settings when compared to the plain one, an<br />acceptable trade-off to ensure data privacy through encryption with achieving an optimal model performance.</span> </p> Anmar A. Al-Janabi Sufyan T. Faraj Al-Janabi Belal Al-Khateeb Copyright (c) 2024 Anmar A. Al-Janabi, Sufyan T. Faraj Al-Janabi, Belal Al-Khateeb https://creativecommons.org/licenses/by/4.0 2024-08-11 2024-08-11 5 3 473 488 10.52866/ijcsm.2024.05.03.029 Design and Development of IoT-Enabled Power Management System for Smart Home with Enhanced Security Feature https://journal.esj.edu.iq/index.php/IJCM/article/view/1403 <p> <span class="fontstyle0">This article presents a proposed architecture for a smart and secure home automation system that incorporates<br />advanced Internet of Things (IoT) capabilities. The system under consideration has been developed with the<br />objective of maximizing the efficiency of power consumption in domestic electrical appliances. By employing a<br />continuous monitoring mechanism for the power consumption of individual devices, this system serves the twin<br />purpose of mitigating the risk of short circuits resulting from excessive electrical loads and enabling users to<br />monitor the energy consumption of each appliance. Consequently, it facilitates the efficient management of billing<br />processes. The proposed model utilizes Internet of Things (IoT) technology to integrate video surveillance at the<br />residential entry, enabling live monitoring of visitors. The fundamental elements of this novel design comprise an<br />Arduino board and a collection of sensors encompassing fire, temperature, humidity, and other variables. The<br />sensors establish a connection with the system via the Thingspeak application, facilitating users' ability to retrieve<br />real-time power usage data from a range of devices. In the event that a device exceeds a pre-established power<br />threshold, the user will be promptly notified through the delivery of timely warnings. These alerts will be presented<br />in the form of graphical representations, which will effectively illustrate the patterns in power consumption.<br />Moreover, the system's scalability enables the automation of many devices, making it a highly attractive solution<br />for applications beyond residential settings. This includes industrial automation, notably within the framework of<br />Industry 4.0.</span> </p> indu bala B. Arun Copyright (c) 2024 indu bala, B. Arun https://creativecommons.org/licenses/by/4.0 2024-08-16 2024-08-16 5 3 10.52866/ijcsm.2024.05.03.039 Robust Image Watermarking Based on Lifting Wavelet Transfrom-Hessenberg Decomposition for Copyright Protection https://journal.esj.edu.iq/index.php/IJCM/article/view/373 <p> <span class="fontstyle0">The modern internet technology enables unauthorized individuals to alter the content of digital<br />images. This work introduces a method for enhancing the robustness of an embedded watermark in images using<br />Lifting Wavelet Transform (LWT) and Hessenberg Decomposition. This study utilizes Hessenberg Decomposition<br />(HD) to insert a watermark image into the LL-sub band of the LWT transform. Singular Value Decomposition<br />(SVD) is employed to convert the H value of HD. Subsequently, the watermark image is put into the singular<br />value. The suggested system underwent testing against a range of image processing assaults, including<br />compression, filters, and noise additions. The testing was conducted using multiple watermark sizes, specifically<br />256×256, 128×128, and 64×64 pixels. The experimental results demonstrate exceptional imperceptibility, with an<br />average PSNR value of 39.5640 dB and a SSIM value of 0.9993. The results demonstrate a high level of resilience,<br />as indicated by the NC value of 0.96390.</span> </p> Agung Sudrajat Ferda Ernawan Agit Amrullah Copyright (c) 2024 Agung Sudrajat, Ferda Ernawan, Agit Amrullah https://creativecommons.org/licenses/by/4.0 2024-08-25 2024-08-25 5 3 10.52866/ijcsm.2024.05.03.043 Hybrid Honey Badger Algorithm with Artificial Neural Network (HBA-ANN) for Website Phishing Detection https://journal.esj.edu.iq/index.php/IJCM/article/view/1508 <p> <span class="fontstyle0">Phishing is a sort of cyberattack that refers to the practice of fabricating fake websites that imitate<br />authentic websites in order to trick users into disclosing private information. Identifying these fake sites is<br />challenging due to their deceptive nature as they often mimic legitimate websites, making it difficult for users to<br />distinguish between the real and fake ones. Artificial Neural Network (ANN) is one popular method for website<br />phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics<br />connected to phishing websites through a network training phase. Technically, in the network training phase of<br />ANN, neurons on the network must be passed over. There are multiple techniques in training the network, one of<br />which is training with metaheuristic algorithms. Metaheuristic algorithms that aim to develop more effective<br />hybrid algorithms by combining the good and successful aspects of more than one algorithm are algorithms<br />inspired by nature. Therefore, this study proposed a hybrid Honey Badger Algorithm with Artificial Neural<br />Network (HBA-ANN) classification model. HBA as metahueristic algorithm is used to optimize the network<br />training process of ANN to improve their performances. Three main steps made up the proposed HBA-ANN<br />classification model: setting up the experiment, optimizing HBA for network training, and network testing. Lastly,<br />the performance of the proposed HBA-ANN classification model is assessed in terms of recall, precision, F1-score,<br />accuracy and error rate using the confusion matrix that was generated for analysis. The proposed hybrid HBAANN was found to be effective in identifying the phishing website after conducting an experimental and statistical<br />analysis.</span> </p> MUHAMMAD ARIF MOHAMAD MUHAMMAD ALIIF AHMAD Copyright (c) 2024 MUHAMMAD ARIF MOHAMAD, MUHAMMAD ALIIF AHMAD https://creativecommons.org/licenses/by/4.0 2024-08-18 2024-08-18 5 3 10.52866/ijcsm.2024.05.03.041 A Machine Learning Algorithms for Detecting Phishing Websites: A Comparative Study https://journal.esj.edu.iq/index.php/IJCM/article/view/1023 <p> Phishing website attacks are a type of cyber-attack in which perpetrators create fraudulent websites<br />that mimic legitimate platforms, such as online banking or social media, with the intent of tricking unsuspecting<br />users into divulging sensitive information. This includes passwords, credit card details, usernames, and other<br />personal data. These phishing websites are designed to look authentic and often employ various techniques, such as<br />URL spoofing, social engineering, and email or text message phishing, to lure victims into revealing their<br />confidential information. Web apps are growing increasingly complex and difficult to identify at first glance,<br />especially when they use encryption and obfuscation techniques. In order to effectively detect and stop phishing web<br />applications from being uploaded to the server in real-time, machine learning must be developed. In addition to<br />including analyses for the machine learning algorithms for identifying web application-based assaults, the study<br />calibrates fresh analyses by executing machine learning algorithms and confirming the findings. The study uses<br />unique and categorized results from a machine learning dataset. As per the outcomes obtained from experimental<br />and comparative analyses of the applied classification algorithms, the random forest model demonstrated the highest<br />accuracy, achieving an impressive rate of 96.89%, followed by the decision tree model at 94.57%, and Extreme<br />Gradient Boosting (XG).</p> Mohanned A.Taha Haider D. A.Jabar Widad K/Mohammed Copyright (c) 2024 Mohanned A.Taha, Haider D. A.Jabar, Widad K/Mohammed https://creativecommons.org/licenses/by/4.0 2024-07-23 2024-07-23 5 3 275 286 10.52866/ijcsm.2024.05.03.015 Formulating an Advanced Security Protocol for Internet of Medical Things based on Blockchain and Fog Computing Technologies https://journal.esj.edu.iq/index.php/IJCM/article/view/1689 <p> <span class="fontstyle0">The Internet of Medical Things (IoMT) is an evolving field in healthcare that connects medical<br />devices to the Internet to enable efficient data sharing and health information collection. The IoMT aims to<br />improve the quality of healthcare, facilitate diagnosis and treatment, and enhance patient safety. Nonetheless, the<br />IoMT networks are usually exposed to multiple security attacks. Also, recent studies indicate that security<br />protocols contain flaws in protecting patient data. Thus, data must be protected by innovative security protocols. In<br />our work, we propose a Medical Security Protocol (MedSecP) to support security in IoMT. The proposed protocol<br />adopts the Twofish encryption, Naive Bayes (NB), and decision tree (DT) within the private blockchain (PBC) Fog<br />Computing (FC) to build robust security procedures. The Twofish encryption algorithm is used to provide medical<br />information concealment. In our proposed protocol, the type of data is first determined, and accurate and<br />appropriate medical decisions are made based on the collected data using a decision tree algorithm, and then rapid<br />classification of the patient data is done using the Naive Bayes algorithm. Confidential medical data is then<br />encrypted using the Twofish algorithm to ensure the confidentiality of this data and prevent unauthorized access.<br />Finally, this encrypted medical data is stored using blockchain technology. Twofish, NB, and DT are organized to<br />work harmoniously with the PBC. The latter manages and distributes data peer-to-peer in IoMT. We leverage Fog<br />Computing to speed up decision-making without resorting to the remote cloud. We analyzed our protocol in terms<br />of security and performance. Our results indicate that MedSecP provides reliable security against attacks as the<br />protocol demonstrated an average security attack response rate of 97.20%, demonstrating its resistance to external<br />threats by keeping the encrypted medical data, classified and achieving appropriate medical decisions. In terms of<br />performance, MedSecP has demonstrated an average security response time of around 50ms, providing fast and<br />efficient performance. In MedSecP, the highest value for encryption is 0.000015 ms, and decryption is 0.000017<br />ms when applying the Twofish algorithm which is considered extremely suitable for implementing health systems<br />operations compared to existing encryption algorithms. Consequently, MedSecP provides lightweight operations in<br />support of complex security measures that qualify it to support healthcare institutions.</span> </p> rasha halim razaq Copyright (c) 2024 rasha halim razaq https://creativecommons.org/licenses/by/4.0 2024-08-31 2024-08-31 5 3 10.52866/ijcsm.2024.05.03.046 Enhancing Efficiency and Fine-Grained Control in Redactable Blockchains with EPBCHF https://journal.esj.edu.iq/index.php/IJCM/article/view/1175 <p> <span class="fontstyle0">Blockchain technology has presented a promising decentralized paradigm to preclude trusted third<br />parties' dominancy. It is a transparent and distributed ledger initially designed for digital cryptocurrencies while<br />currently extended to serve various industries. However, Blockchain immutability presents challenges, as it can be<br />misused for storing illicit content, violating privacy regulations, and limiting data management flexibility. Policy<br />Based Chameleon Hash Function (PBCH) has transformed blockchain rewriting contents concept via permitting<br />modifiers to amend certain transaction since they possessed fundamental privileges satisfying certain access policy.<br />However, PBCHF suffers from efficiency issues due to its reliance on Chameleon Hash ephemeral Trapdoor (CHET)<br />and Attribute-Based Encryption (ABE), significantly impacting overall efficiency. We propose the Efficient PolicyBased Chameleon (EPBCHF) construction by replacing CHET with Chameleon-Hashes by Dual Long-Term<br />Trapdoors (CHDLTT) to address these challenges. Additionally, we introduce an enhanced encryption scheme<br />resilient against chosen-ciphertext attacks (CCA) without compromising overall efficiency. Modelling EPBCHF<br />proves practical instantiation accompanied by rigorous security proofs. Our construction provides a fine-grained<br />redactable blockchain in comparison to the currently proposed solutions. The evaluated results confirm that the<br />proposed EPBCHF is scalable and efficient due to having the ability to handle unlimited transaction volumes<br />additionally, data is efficiently processed without further overhead meanwhile data size consistency reflects a robust<br />memory management due to predicted memory size, network bandwidth and storage requirement for future growth<br />thereby, EPBCHF is proven to be reliable and scalable.</span> </p> shams abdali Mohd Najwadi Y Hasan Falah Hasan Copyright (c) 2024 shams abdali, Mohd Najwadi Y, Hasan Falah Hasan https://creativecommons.org/licenses/by/4.0 2024-07-06 2024-07-06 5 3 194 212 10.52866/ijcsm.2024.05.03.010 Adaptive Heterogeneity Index Cloudlet Scheduler for Variable Workload and Virtual Machine Configuration https://journal.esj.edu.iq/index.php/IJCM/article/view/1708 <p>In any service-based computing environment, performance pertains to the effectiveness of a system or application in managing user tasks. The key performance assessment metrics include makespan, responsiveness, speed, throughput, resource utilization, etc. In any distributed landscape, like cloud computing, optimal performance relies on resource management techniques such as scheduling, load balancing, etc. Cloud environments often exhibit varying levels of heterogeneity arising from the diverse characteristics of cloudlets and virtual machines. This research paper focuses on the impact of this heterogeneity and proposes two scheduling algorithms to address it effectively: the Variance Managed Heuristic Scheduler (VMHS) and the Adaptive Heterogeneity Index Cloudlet Scheduler (AHICS). AHICS aims to minimize makespan, virtual machine underutilization, the degree of load imbalance, and the deviation of completion time among virtual machines. AHICS functions as the main scheduler, whereas VMHS and MaxMin act as sub-schedulers in this proposed work. AHICS is designed to be flexible and adjust its scheduling strategy based on the level of heterogeneity within the cloud environment. AHICS utilizes the VMHS scheduler in scenarios with a low heterogeneity index or the MaxMin scheduler when the cloudlets and the virtual machines characteristics are highly diverse or heterogeneous. This multi-objective AHICS scheduling algorithm harnesses the strengths of both schedulers as a hybrid algorithm. Implemented using the CloudSim 3.0.3 simulator, experimental results demonstrate that AHICS outperforms other heuristic scheduling algorithms, including MinMin, TASA, HAMM, PTFR, and RSSM, in terms of makespan, virtual machine utilization ratio, the degree of load imbalance, and the deviation of completion time among the virtual machines in both low and high heterogeneity levels</p> Gritto D Muthulakshmi P Copyright (c) 2024 Gritto D, Muthulakshmi P https://creativecommons.org/licenses/by/4.0 2024-08-29 2024-08-29 5 3 10.52866/ijcsm.2024.05.03.048 Taxonomy, Open Challenges, Motivations, and Recommendations in Driver Behavior Recognition: A Systematic Review https://journal.esj.edu.iq/index.php/IJCM/article/view/1261 <p> <span class="fontstyle0">Driver behavior has a major role in many of the unpleasant things that happen when driving, such as<br />crashes or accidents, heavy traffic, abrupt braking, and acceleration and deceleration. Numerous investigations<br />have been carried out to look into the variables influencing driving behavior. To offer a thorough analysis and<br />classify these findings according to a logical classification, further research is required. The goal of this systematic<br />review is to enhance knowledge about the variables influencing driving behavior. A taxonomy on the subject of<br />driver behavior in various ITS domains and their categories was also produced by this work.<br />A systematic review of the literature was performed in accordance with PRISMA (Preferred Reporting Items for<br />Systematic Reviews and Meta-Analyses) guidelines to gain insight into driver behaviour recognition.<br />Specifically, IEEE Explore, ScienceDirect and Springer databases were searched to identify any relevant articles<br />with a focus on "driver behavior," "driver style," "driver pattern," "driver simulator," and "visual attention,” from<br />2008 to 2021 (15 April).<br />Several filtering and scanning procedures were performed on all 606 retrieved articles in compliance with the<br />exclusion/inclusion criteria; nonetheless, only 50 articles met the requirements. The criteria-compliant references<br />were examined and evaluated. Furthermore, every piece that was included was classified using a taxonomy. The<br />four categories created by the taxonomy are review, experiment, framework, and other study types. To illustrate<br />the main gaps in the literature regarding the identification of driving behavior, a discussion and analysis were<br />presented. This thorough analysis has highlighted the issues and reasons while also pointing forth fresh research<br />directions.</span> </p> ziadoon al-qaysi Copyright (c) 2024 ziadoon al-qaysi https://creativecommons.org/licenses/by/4.0 2024-07-31 2024-07-31 5 3 358 377 10.52866/ijcsm.2024.05.03.021 Various Closed-Form Solitonic Wave Solutions of Conformable Higher-Dimensional Fokas Model in Fluids and Plasma Physics https://journal.esj.edu.iq/index.php/IJCM/article/view/1329 <p>This work focuses on finding closed-form analytic solutions of a higher-dimensional fractional model,<br />in conformable sense, known by the (4+1)-dimensional Fokas equation. Fractional partial differential equations<br />(FPDEs) and systems can describe heritable real-world occurrences. However, solving such models can be difficult,<br />especially for nonlinear problems. The homogeneous balancing method (HBM) is investigated and extended to<br />handle the (4+1)-dimensional Fokas equation with Kerr law nonlinearity. The HBM has the ability to solve linear<br />and nonlinear fractional problems, incorporating the concepts of some fractional calculus principles, including<br />fractional derivative techniques. It's important to note that there isn't a single and universally applicable method to<br />solve such equations due to their complexity. The specific form of the equation and the initial or boundary conditions<br />influence the solution method chosen. The results obtained from the extended HBM are compared to those in the<br />literature to prove the strategy's efficacy. This paper proposes expanding the HB technique with result analysis to<br />solve nonlinear FPDEs, demonstrating its feasibility and efficiency</p> Israa Ibrahim Mizal Dawi Wafaa Taha Ali Jameel Mohammad Tashtoush Emad Az-Zo’bi Copyright (c) 2024 Israa Ibrahim, Mizal Dawi, Wafaa Taha, Ali Jameel, Mohammad Tashtoush, Emad Az-Zo’bi https://creativecommons.org/licenses/by/4.0 2024-08-06 2024-08-06 5 3 401 417 10.52866/ijcsm.2024.05.03.027 Fuzzy Weighted Zero Inconsistency Method (FWZIC) for Multi-Criteria Decision-Making Weighting Criteria: A Systematic Literature Review https://journal.esj.edu.iq/index.php/IJCM/article/view/1394 <p> <span class="fontstyle0">Researchers in various fields have consistently used Multi-Criteria Decision-Making (MCDM)<br />methods for discipline improvement, employing both standard and novel approaches. Selecting a weighting<br />mechanism for evaluation criteria is critical in MCDM problems. Recognizing the importance of remaining up to<br />date on such developments in methodology, this study aims to review several innovative methods integrated with<br />Fuzzy Weighted Zero Inconsistency (FWZIC). Relying on the papers taken from the significant databases: IEEE<br />Xplore (IEEE), ScienceDirect (SD), Scopus, and PubMed from 23 August 2023 to 30 October 2023, where each<br />method was read and analyzed for its characteristics and steps. These indexes were deemaed extensive and<br />dependable enough to encompass the scope of our literature review. A total number of articles, n = 26 were chosen<br />based on the criteria for inclusion and exclusion have been selected for this systematic review. By using<br />bibliometric and content analysis, this study examined the developing ways with (FWZIC), as well as study<br />components (sources, authors, different countries, and affiliations), areas of application, case studies, fuzzy<br />implementations, hybrid studies (use of other weighting methods), and application tools for these methods. The<br />results of this literature systematic review (LSR) provide an accurate depiction of each new development related to<br />the weighting method and its utilization, such as: 1- Extracting the types of development employed in the FWZIC<br />approach based on Fuzzy Set. 2- Extracting types of aggregation operators. 3- Analyzing integration methods with<br />FWZIC (hybridized with other methods), and 4- Case study types showing how MCDM approaches may help<br />decision-makers in a variety of decisions. Also, a set of recommendations has been presented to the researchers for<br />the development of new method types, as a new direction for future work. This will provide academics and<br />practitioners in the field of MCDM with valuable insights and significant expertise for data analysis and decisionmaking.</span> </p> ziadoon al-qaysi Copyright (c) 2024 ziadoon al-qaysi https://creativecommons.org/licenses/by/4.0 2024-08-13 2024-08-13 5 3 583 641 10.52866/ijcsm.2024.05.03.037 Arabic Chatbots Challenges and Solutions: A Systematic Literature Review https://journal.esj.edu.iq/index.php/IJCM/article/view/1481 <p>Since the beginning of Natural Language Processing, researchers have been highly interested in the idea of equipping machines with the ability to think, understand, and communicate in a human-like manner. However, despite the significant progress in this field, particularly in English, Arabic research remains in its early stages of development. This study presents a Systematic Literature Review on challenges faced in Arabic chatbot development and the proposed solutions. Utilizing the search terms "ARABIC," "CHATBOT," "CHALLENGES," and "SOLUTION," (including synonyms) we systematically surveyed studies published between 2000 and 2023 from Scopus, Science Direct, Web of Science, PubMed, SpringerLink, IEEE Xplore, ACM, Ebesco, and ICI. Moreover, besides Google Scholar and ResearchGate, we employed a manual snowballing technique to discover supplementary relevant research by examining the references of all chosen primary studies. The included studies were assessed for eligibility based on the quality assessment checklist we developed. Out of 3,891 studies, only 64 were deemed eligible. Many challenges were identified, including the scarcity of well-structured datasets. To overcome this (n=35) studies manually collected and preprocessed data. Additionally, Arabic language complexity led (n=53) researchers to adopt pre-scripted rules approaches, followed by generative approaches (n=10), and hybrid approach (n=1). Furthermore, (n=27) studies employed human-based evaluation metrics to assess the chatbot performance. while, (n=11) studies haven’t used any metrics. Based on conducted research, a critical research priority is providing Arabic with high-quality resources, such as an Arabic dataset that includes dialectal variations and incorporates empathy, lexicon corpora, and also a word normalization library. These resources will enable the chatbot to interact more naturally and humanely. Additionally, hybrid approaches have shown promising results, particularly in low-resource languages, such as Arabic. Therefore, more focus should be dedicated into implementing hybrid approaches in chatbot development. Furthermore, evaluating the chatbot performance is still an open domain for further research and contribution, highlighting the need for innovative standardized evaluation methods.</p> soufiayn ouali EL GAROUANI Said Copyright (c) 2024 soufiayn ouali, EL GAROUANI Said https://creativecommons.org/licenses/by/4.0 2024-06-30 2024-06-30 5 3 128 169 10.52866/ijcsm.2024.05.03.007 The New Strange Generalized Rayleigh Family: Characteristics and Applications to COVID-19 Data https://journal.esj.edu.iq/index.php/IJCM/article/view/1122 <p>In this paper, we introduce a novel family of continuous distributions known as the Odd Generalized Rayleigh-G Family. Within this family, we present a special sub-model known as the odd Generalized Rayleigh Inverse Weibull (OGRIW) distribution. The OGRIW distribution is derived by combining the T-X family and the Generalized Rayleigh distribution. We provide a comprehensive expansion of the (PDF) and (CDF) for the OGRIW distribution. Additionally, we investigate several mathematical properties of the OGRIW distribution, including moments, moment-generating function, incomplete moments, quantile function, order statistics and Rényi entropy. To estimate the model parameters, we employ the maximum likelihood method, aiming to identify the parameter values that maximise the likelihood of the observed data.</p> <p>Finally, we apply the proposed OGRIW distribution to two real COVID-19 datasets from Mexico and Canada. The results of these applications demonstrate that the new distribution exhibits remarkable flexibility and outperforms other comparative distributions in terms of accurately modelling the COVID-19 data.</p> <p> </p> Alaa A. Khalaf Mundher A. khaleel Copyright (c) 2024 Alaa A. Khalaf, Mundher A. khaleel https://creativecommons.org/licenses/by/4.0 2024-06-10 2024-06-10 5 3 92 107 10.52866/ijcsm.2024.05.03.005 Approach for Detecting Arabic Fake News using Deep Learning https://journal.esj.edu.iq/index.php/IJCM/article/view/1591 <p>: Fake news has spread more widely over the past few years. The development of social media and<br />internet websites has fueled the spread of fake news, causing it to mix with accurate information. The majority of<br />studies on Fake News Detection FND were in English, but recent attention has been focused on Arabic. However,<br />there aren't many studies on Arabic fake news detection. In this work, a new Arabic fake news detection approach<br />has been proposed using Arabic dataset publically available and a translated English fake news dataset into Arabic.<br />A new model Text-CNNs based on 1D Convolution Neural Networks CNNs has been used for classification real<br />and fake news. Extensive experimental results on the Arabic fake news dataset show that our proposed approach<br />provided high detection accuracy about (99.67%), Precision (99.45), Recall (99.65) and F1-score (99.50).</p> khalid shaker Alhity Arwa Alqudsi Copyright (c) 2024 khalid shaker Alhity, Arwa Alqudsi https://creativecommons.org/licenses/by/4.0 2024-08-29 2024-08-29 5 3 10.52866/ijcsm.2024.05.03.049 A Review of the Integration Between Geospatial Artificial Intelligence and Remote Sensing https://journal.esj.edu.iq/index.php/IJCM/article/view/1137 <p>: Experts have extensively explored the advantages and applications of modern artificial intelligence<br />(AI) algorithms across various domains. Geomatics data processing is no exception, as AI offers significant<br />opportunities in this field. However, understanding how AI can be customized or developed to meet the unique<br />requirements of geomatics data is crucial. Integrating AI techniques into geomatics has given rise to Geospatial<br />Artificial Intelligence (GeoAI), a novel approach to uncovering geographic information. Nevertheless, there<br />remains a shortage of comprehensive research on the specific applications of AI in geospatial contexts.<br />Consequently, this study aims to establish AI-based methodologies for the analysis and interpretation of complex<br />geomatics data, bridging existing gaps, and elucidating the connections between AI principles and geomatics data.<br />This paper delves into the innovations and tools employed for data acquisition in geomatics, focusing on RGB<br />images, thermal images, 3D point clouds, GPS coordinates, and hyperspectral/multispectral images. Subsequently,<br />we elucidate how AI techniques have successfully extracted valuable insights from geomatics data. Furthermore,<br />we present various practical scenarios where AI has been deployed and the specific methodologies employed for<br />each case. Through this exploration, we aim to highlight the immense potential of AI in geomatics and stimulate<br />future research endeavors.</p> abeer alshiha Copyright (c) 2024 abeer alshiha https://creativecommons.org/licenses/by/4.0 2024-07-08 2024-07-08 5 3 252 262 10.52866/ijcsm.2024.05.03.013 LEARNERS' EMOTIONS ESTIMATION USING VIDEO PROCESSING TECHNIQUES FOR OPTIMUM E-LEARNING EXPERIENCE https://journal.esj.edu.iq/index.php/IJCM/article/view/1704 <p> <span class="fontstyle0">Learning management systems (LMSs) have integrated multiple technologies to enhance the elearning experience. One such technology is the emotional recognition system (ERS), which provides tutors with<br />data on learners' emotions, including anger, sadness, happiness, and more. ERS utilizes various data sources like<br />facial expressions, body activities, and brain signals to recognize emotions. This paper provides an overview of the<br />ERS structure and discusses the state-of-the-art technologies in this field. The results indicate that deep learning<br />based ERS using VGG19 for feature extraction over the FER2013 dataset is reliable with a recognition accuracy of<br />87% using Random Forest Algorithm.</span> </p> Mohammed Subhi Copyright (c) 2024 Mohammed Subhi https://creativecommons.org/licenses/by/4.0 2024-08-16 2024-08-16 5 3 10.52866/ijcsm.2024.05.03.038 Emotion Recognition Using Various Measures and Computational Methods: Review https://journal.esj.edu.iq/index.php/IJCM/article/view/1200 <p> <span class="fontstyle0">Emotion recognition has garnered significant attention as a burgeoning research domain, owing to<br />its potential applications across diverse fields such as human-computer interaction, affective gaming, marketing,<br />and human-robot interaction. Accurately interpreting and appropriately responding to human emotions remains a<br />critical challenge in the development of systems. This obstacle necessitates a thorough understanding of emotions<br />to enhance user experiences within such systems. This paper conducts a comprehensive review focusing on<br />advancements in emotion recognition techniques, with an emphasis on leveraging a variety of sensors and<br />computational methods. Our study findings highlight the significant improvement to emotion recognition accuracy<br />when multiple measures and computational methods, rather than a single modality, is used. This article contributes<br />to the field by thoroughly reviewing and comparing diverse measures and computational methods for emotion<br />recognition. The study highlights the pivotal role of employing multiple modalities and advanced machine learning<br />algorithms to achieve superior accuracy and reliability in emotion recognition. Furthermore, this research identifies<br />potential avenues for further investigation and development, such as integrating multimodal data and exploring<br />novel features and fusion techniques. The insights offered in this study provide valuable guidance for researchers<br />and practitioners in the field, facilitating the advancement of technologies that adeptly understand and respond to<br />human emotions.</span> </p> Abir Hamrouni Copyright (c) 2024 Abir Hamrouni https://creativecommons.org/licenses/by/4.0 2024-07-31 2024-07-31 5 3 314 329 10.52866/ijcsm.2024.05.03.018 Automatic Temperature Control System Using African vultures optimization algorithm https://journal.esj.edu.iq/index.php/IJCM/article/view/1729 <p><span class="fontstyle0">One of the most important tasks in control engineering is tuning a PID controller for maximum<br>efficiency. However, without a great deal of practice, manual adjustment of PID settings might result in erroneous<br>results. Using met heuristic algorithms is one method for tweaking the PID controller. These algorithms, which are<br>inspired by the laws of nature, can effectively find the sweet spot for the PID settings. Therefore, instead of<br>manually tweaking the PID controller, using met heuristic methods can greatly enhance the system's performance<br>while decreasing the related expenses. A reliable temperature control system is crucial to the production of a wide<br>variety of industrial goods. The fact that it uses less energy than rivals makes it a hot commodity. The console is<br>the most effective way to monitor this procedure. The air conditioning in the room is managed by a whole new<br>model built on metaheuristic algorithms. The temperature regulation is processed using a PID controller based on<br>the AVOA algorithm. Overshot, settling, and rising times have all been shortened. along with other methods from<br>the literature, such the Ziegler-Nichols and PSO Optimizer algorithm. Efficiency was evaluated in terms of percent<br>overrun, reaction time, settling time, and steady state error. Integral Time Squared Error (ITSE), Integral Time<br>Absolute Error (ITAE), Integral Absolute Error (IAE), and Integral Squared Error (ISE) are used to compare the<br>empirical data.</span> </p> Muntadher Khamees Mostafa Abdulghafoor Mohammed Dina Hassan Abbas Copyright (c) 2024 Muntadher Khamees, Mostafa Abdulghafoor Mohammed, Dina Hassan Abbas https://creativecommons.org/licenses/by/4.0 2024-08-25 2024-08-25 5 3 10.52866/ijcsm.2024.05.03.044 SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes https://journal.esj.edu.iq/index.php/IJCM/article/view/1278 <p>With the recent increase in the risks and attacks facing our daily lives and digital environment around us,<br />the trend towards securing data has become inevitable. Block ciphers play a crucial role in modern crypto-applications<br />such as secure network storage and signatures and are used to safeguard sensitive information. The present paper<br />develops a new variant of the symmetric model called SUMER family ciphers with three equivalent modes: lightweight,<br />conventional (traditional), and extended ciphers. SUMER name belongs to one of the oldest civilizations in<br />Mesopotamia and stands for Secure Universal Model of Encryption Robust Cipher. The SUMER cipher is based on a<br />simple and robust symmetric structure and involves solid algebraic theories that completely depend on the Galois Field<br />GF(28<br />). SUMER cipher is designed to work with two involutional structures of the Substitution-Permutation Network<br />(SPN) and Feistel structure. These two involutional structures mean that the same algorithm is used for the encryption<br />and decryption process, and only the algorithm of the ciphering key is used in reverse order in both structures. The<br />SUMER lightweight structure is an elegant mode that does not need building an S-Box that requires a large amount of<br />memory and a number of electronic logical gates as S-Box construction has been canceled and replaced by the on-fly<br />computation clue, which does not need a reserved memory for building S-Box. SUMER family ciphers also can work in<br />a traditional mode or as an extended mode with high margin security. This family of ciphers is applicable with multimodes of various utilizations. The proposed ciphers are designed to be byte-oriented, showing good evaluation and<br />results under several measurement tests for speed, time implementation, and efficiency.</p> omar dawood Copyright (c) 2024 omar dawood https://creativecommons.org/licenses/by/4.0 2024-07-08 2024-07-08 5 3 213 228 10.52866/ijcsm.2024.05.03.011 Fuzzy Decision by Opinion Score Method (FDOSM): A Systematic Review https://journal.esj.edu.iq/index.php/IJCM/article/view/1388 <p> <span class="fontstyle0">Multiple criterion decision-making (MCDM) has been widely utilized in everyday life in various<br />ways, with countless success stories aiding in the analysis of complicated problems and the provision of an<br />accurate decision process. To date, MCDM remains the best strategy to provide the finest solutions to solve<br />complex problems in the field of specialized systems. Even so, several challenges faced MCDM approaches, as<br />mentioned in academic literature. The most significant challenges are uncertainty and ambiguity. The fuzzy<br />decision by opinion score method (FDOSM) is one of the most recent MCDM methods. Consequently, the purpose<br />of this study was to examine and assess publications regarding the various types of developments of FDOSM in<br />recent years and to collect the essential literature findings. Fundamentally, based on systematic review protocol,<br />the searching process was conducted across four major databases, including IEEE Xplore (IEEE), ScienceDirect<br />(SD), Scopus, and PubMed from the date of publishing of FDOSM article, based on particular Query "(MCDM OR<br />'Multi-criteria decision-making') AND (FDOSM OR 'Fuzzy decision by opinion score method') AND (Fuzzy)<br />AND ('development method' OR 'developing'). The data collection process started on 23 August 2023 and ended<br />on 30 October 2023, which included several scientific studies related to development FDOSM across several fuzzy<br />types. These indexes are considered extensive and dependable enough to have the scope of our literature review.<br />A final set of articles, n=22, was selected depended on predefined inclusion and exclusion criteria for this study.<br />A coherent classification for current studies has been formed according to the development of FDOSM based on a<br />new extension of a fuzzy set. Other aspects, such as the research method followed, the protocol adopted by the<br />systematic review, and demographic statistics of the literature distribution, were included. Exciting patterns were<br />observed, which were compiled and analyzed in tabular format according to their importance. The results of this<br />literature systematic review provide a precise summary of each recent development concerning the FDOSM and its<br />use, including: 1- Extracting the development types employed in the FDOSM method, 2- Extracting aggregation<br />operator types, 3- Integration Method with FDOSM (hybrid with other methods), and 4- Case study types showing<br />how FDOSM approaches may help decision-makers in numerous decisions. Finally, this study highlights research<br />opportunities and encourages current and future efforts to better comprehend this field.</span> </p> ziadoon al-qaysi Copyright (c) 2024 ziadoon al-qaysi https://creativecommons.org/licenses/by/4.0 2024-08-13 2024-08-13 5 3 583 621 10.52866/ijcsm.2024.05.03.036 Mobile Augmented Reality Framework in STEM Education: A Systematic Literature Review https://journal.esj.edu.iq/index.php/IJCM/article/view/1468 <p> <span class="fontstyle0">There is a growing concern with preparing a sufficient number of highly qualified professional in<br />areas of Science, Technology, Engineering and Mathematics (STEM). However, the number of students to reach<br />proficiency and pursue in STEM majors seems to be decreasing. Augmented Reality (AR) is one of the evolving<br />technologies that have potential and effect on learning, especially in STEM education. The aim of this paper is to<br />review and analyze existing works that are related to AR in STEM Education. In this study, the common design<br />elements, components or features for designing educational AR framework in STEM education were analyzed.<br />This paper determined a literature review which included 67 studies from scientific journals and papers. The<br />findings indicated that there were many components which played an important role to construct a mobile AR<br />framework in STEM education. By reviewing existing research, the study identified key components for designing<br />effective AR frameworks, including AR systems, multimedia elements, teaching methods, and learning outcomes.<br />The findings suggested that AR could enhance student motivation, understanding, and development of practical<br />skills in STEM subjects. With these reviewed, understanding on how to develop the educational AR apps in STEM<br />education could be enhanced.</span> </p> Danakorn Nincarean Copyright (c) 2024 Danakorn Nincarean https://creativecommons.org/licenses/by/4.0 2024-08-11 2024-08-11 5 3 10.52866/ijcsm.2024.05.03.032 Enhanced Cancer Subclassification Using Multi-Omics Clustering and Quantum Cat Swarm Optimization https://journal.esj.edu.iq/index.php/IJCM/article/view/1724 <p><span class="fontstyle0">Integrating multiple omics data can significantly improve the accuracy of cancer subclassification, a<br />challenging task due to the high dimensionality and limited sample sizes. The integration of these data sets can<br />enhance model performance. This study addresses these challenges by employing Quantum Cat Swarm<br />Optimization (QCSO) for feature selection, along with K-means clustering and Support Vector Machine (SVM) for<br />classification. Using QCSO, the most significant features were identified, resulting in an increase in accuracy from<br />81% to 100%. Performance was evaluated using accuracy, F1-score, precision, recall, ROC, and the silhouette<br />metric, all of which confirmed the effectiveness of the feature selection approach. Additionally, this method<br />enhances the classification of samples while making the models more interpretable, providing better insights into<br />the molecular mechanisms of cancer. This work contributes to advancing knowledge in the field of cancer research<br />and biology in general.</span> </p> Mazin Mohammed Copyright (c) 2024 Mazin Mohammed https://creativecommons.org/licenses/by/4.0 2024-08-13 2024-08-13 5 3 552 582 10.52866/ijcsm.2024.05.03.035 The Gompertz Nadarajah-Haghighi (GoNH) Distribution Properties with Application to Real Data https://journal.esj.edu.iq/index.php/IJCM/article/view/1516 <p>In this study, we propose a continuous statistical distribution consisting of four parameters based on<br />the Gompertz family called the Gompertz Nadarajah-Haghighi (GoNH) distribution. Adding parameters to the<br />basic distribution provides the distribution with flexibility and efficiency in analysing real-world data. The model<br />that was recently suggested has many mathematical and statistical properties. Explicit formulas for its moments,<br />moment-generating function, survival function, risk function, characteristic function, quantile function, expansion<br />of pdf, and ordered statistics are only a few of the many mathematical and statistical features of the recently<br />proposed model. The maximum likelihood estimates (MLE) method was used to estimate the model’s parameters.<br />We conducted various simulation experiments to thoroughly evaluate the small sample of MLEs. The research<br />examined the estimators’ bias and mean square error, yielding positive outcomes. The study’s results demonstrated<br />that the GoNH distribution fit better than other distributions in two real-world data applications.</p> Dalya Dheab Ahmed Mundher Abdullah Khaleel Copyright (c) 2024 Dalya Dheab Ahmed, Mundher Abdullah Khaleel https://creativecommons.org/licenses/by/4.0 2024-08-25 2024-08-25 5 3 10.52866/ijcsm.2024.05.03.042 Comparison of non-linear time series models (Beta-t-EGARCH and NARMAX models) with Radial Basis Function Neural Network using Real Data https://journal.esj.edu.iq/index.php/IJCM/article/view/1046 <p>This paper presents a comparison of three different non-linear time series modelling approaches: NARMAX (Non-linear Autoregressive Moving Average with Exogenous Inputs), Beta-t-EGARCH (Beta t Exponential Generalized Autoregressive Conditional Heteroscedasticity), and Radial Basis Function Neural Networks (RBFNN) applied to weekly stock market index data.</p> <p>We will explain three types of models and compare their compositions and structures. Then, we will show which model gives better predictions. To study series data, the comparison involved analysing the structure of the model and its errors in various time series models and summarising their findings. We divide the data into two parts: training data to structure the time series and testing. The training data tests the model's predictions. Then, we can analyse the model with the errors and the best deterrence predictions. After selecting the NARMAX and Beta-t-EGARCH models, we test them with specific criteria. The best choice is finding the model with the lowest average errors.</p> <p>For this study, we analysed the weekly average closing of the Aramco 2222 index from 15 December 2019 to 16 July 2023 and made 187 observations.</p> Hiba Abdullah Nihad S. khalaf Nooruldeen A. Noori Copyright (c) 2024 Hiba Abdullah, Nihad S. khalaf, Nooruldeen A. Noori https://creativecommons.org/licenses/by/4.0 2024-06-10 2024-06-10 5 3 26 44 10.52866/ijcsm.2024.05.03.003 Soft Computing-Based Generalized Least Deviation Method Algorithm for Modeling and Forecasting COVID-19 using Quasilinear Recurrence Equations https://journal.esj.edu.iq/index.php/IJCM/article/view/1700 <p> <span class="fontstyle0">This study introduces an advanced algorithm based on the Generalized Least Deviation Method<br />(GLDM) tailored for the univariate time series analysis of COVID-19 data. At the core of this approach is the<br />optimization of a loss function, strategically designed to enhance the accuracy of the model’s predictions. The<br />algorithm leverages second-order terms, crucial for capturing the complexities inherent in time series data. Our<br />findings reveal that by optimizing the loss function and e</span><span class="fontstyle2">ff</span><span class="fontstyle0">ectively utilizing second-order model dynamics, there is a<br />marked improvement in the predictive performance. This advancement leads to a robust and practical forecasting tool,<br />significantly enhancing the accuracy and reliability of univariate time series forecasts in the context of monitoring<br />COVID-19 trends.</span> </p> Mostafa Abotaleb Copyright (c) 2024 Mostafa Abotaleb https://creativecommons.org/licenses/by/4.0 2024-08-08 2024-08-08 5 3 441 472 10.52866/ijcsm.2024.05.03.028 Distinguishing between Student-Authored and ChatGPTGenerated Texts: A Preliminary Exploration of Human Evaluation Techniques https://journal.esj.edu.iq/index.php/IJCM/article/view/1178 <p> <span class="fontstyle0">The emergence of ChatGPT has opened up numerous possibilities as a supportive tool in the realms<br />of education and research. However, the potential for students to engage in plagiarism facilitated by ChatGPT poses<br />a significant challenge for university faculty members, particularly those possessing limited algorithm literacy and<br />working in low-resourced educational contexts. The study draws upon the initial experiences and reflections of one<br />of the authors and is accomplished by the collaboration of all the contributing authors. ChatGPT and forum posts<br />within the learning environment served as the research tools. Employing the Turing Test, seven key human-detection<br />techniques for deciphering ChatGPT-generated texts have been proposed in this study, including detecting discourse<br />particles, conversational indicators, the degree of grammatical flawlessness and clarity, formulaic genre structure,<br />numbered and sub-sectioned body paragraphs, use of transitional words and self-acknowledgment of ChatGPT’s<br />non-human nature. This study contributes to the emerging body of literature on ChatGPT by enhancing quality<br />education, reinforcing academic integrity and catalysing further research endeavours in the development towards<br />human-detection strategies to combat ChatGPT-facilitated plagiarism.</span> </p> Md. Saiful Alam Copyright (c) 2024 Md. Saiful Alam https://creativecommons.org/licenses/by/4.0 2024-07-23 2024-07-23 5 3 287 304 10.52866/ijcsm.2024.05.03.016 Designing and Implementing an ECG Reader and Heart Disease Classification Device Using Deep Learning (Comprehensive Review) https://journal.esj.edu.iq/index.php/IJCM/article/view/1727 <p><span class="fontstyle0">Cardiovascular cases remain a significant health care concern, necessitating new development<br>methods for their prompt and accurate identification where a promising advancements is demonstrated using Deep<br>Learning (DL) in automating heart anomalies detection, including irregular heartbeats, heart attacks, and abnormal<br>heart rhythms, through the analysis of electrocardiogram (ECG) signals, which guided this article to explore the<br>integration of DL methodologies in examining ECG data to enhance the diagnosis of various cardiac ailments and<br>delves into the development of novel ECG devices designed to facilitate efficient data acquisition while ensuring<br>patient comfort and accessibility.<br>The devices used must provide real-time monitoring, seamless integration with DL models, enabling continuous<br>and personalized heart disease detection for each patient, hence this paper offers an overview of the synergy<br>between innovative ECG device technology and advanced DL algorithms heralds a transformative era in heart<br>disease diagnosis, emphasizing patient-centered care, the current research landscape and the challenges ahead, and<br>the promising possibilities on the horizon, highlighting the potential to revolutionize cardiovascular healthcare<br>through early, precise, and personalized heart diseases identification and monitoring</span> </p> Ghasaq Saad Jameel Copyright (c) 2024 Ghasaq Saad Jameel https://creativecommons.org/licenses/by/4.0 2024-08-18 2024-08-18 5 3 10.52866/ijcsm.2024.05.03.034 Picard and Adomian decomposition methods for a fractional quadratic integral equation via generalized fractional integral https://journal.esj.edu.iq/index.php/IJCM/article/view/1272 <p> <span class="fontstyle0">The primary focus of this paper is to thoroughly examine and analyze a class of a fractional quadratic<br />integral equation via </span><span class="fontstyle0">generalized </span><span class="fontstyle0">fractional integral. To achieve this, we introduce an operator that possesses<br />fixed points corresponding to the solutions of the fractional quadratic integral equation, e</span><span class="fontstyle3">ff</span><span class="fontstyle0">ectively transforming the<br />given equation into an equivalent fixed-point problem. By applying the Banach fixed-point theorems, we prove the<br />uniqueness of solutions to fractional quadratic integral equation. Additionally, The Adomian decomposition method<br />is used, to solve the resulting fractional quadratic integral equation. This technique rapidly provides convergent<br />successive approximations of the exact solution to the given fractional quadratic integral equation, therefore, we<br />investigate the convergence of approximate solutions, using the Adomian decomposition method. Finally, we provide<br />some examples, to demonstrate our results. Our findings contribute to the current understanding of fractional<br />quadratic integral equation and their solutions and have the potential to inform future research in this area.</span> </p> Alan Jalal Abdulqader Saleh S. Redhwan Ali Hasan Ali Omar Bazighifan Awad T. Alabdala Copyright (c) 2024 Alan Jalal Abdulqader, Saleh S. Redhwan, Ali Hasan Ali, Omar Bazighifan, Awad T. Alabdala https://creativecommons.org/licenses/by/4.0 2024-07-06 2024-07-06 5 3 170 180 10.52866/ijcsm.2024.05.03.008 Enhancing Wireless Sensor Networks Features Using Software-Defined Networking Techniques and ACO Algorithms https://journal.esj.edu.iq/index.php/IJCM/article/view/1369 <p> <span class="fontstyle0">Wireless sensor networks (WSNs) are the most important networks for things such as monitoring<br />natural phenomena, agriculture, health care, and so on. There are several challenges associated with using WSNs,<br />the most important of which are energy consumption, expansion issues, or even data routing issues. There are many<br />techniques and algorithms that can address these challenges and make it easier to use WSNs. These techniques and<br />algorithms vary depending on the challenge to be overcome. In this study, Software Defined Network (SDN)<br />technology was used for the purpose of improving WSNs and saving energy for nodes in those networks. The Ant<br />Colony Optimization (ACO) algorithm, which is an algorithm that follows ants’ foraging method, was also used.<br />This algorithm was used to find the shortest data path from the starting node to the target node. The results of the<br />proposed system was a significant improvement in the performance of WSNs. The system saved energy, removed<br />dead nodes, and found better and shorter paths to reach the target nodes. The proposed approach was versatile and<br />adaptable, making it suitable for various WSN applications and deployment scenarios. The results of the proposed<br />system led to energy savings of up to 0.891 mj and only 35 nodes compared to traditional methods, which can have<br />up to 74 dead nodes.</span> </p> Ghassan Abed Copyright (c) 2024 Ghassan Abed https://creativecommons.org/licenses/by/4.0 2024-08-11 2024-08-11 5 3 10.52866/ijcsm.2024.05.03.030 Tackling the Berth Allocation Problem via Harmony Search Algorithm https://journal.esj.edu.iq/index.php/IJCM/article/view/1395 <p> <span class="fontstyle0">Berth Allocation Problem (BAP) is a renowned difficult combinatorial optimization problem that<br />plays a crucial role in maritime transportation systems. BAP is categorized as non-deterministic polynomial-time<br />hard (NP-hard) problems, that is very tough to resolve for optimality within an acceptable timeframe. Many<br />metaheuristic algorithms have been suggested to tackle this problem, and yet, most of these algorithms have some<br />drawbacks such as they have a weak ability to explore the solution space (they struggle escaping from local<br />minima) and they face the difficulties to operate on different datasets. Consequently, the need to either enhance the<br />existing algorithms or utilize a new algorithm is still necessary. Harmony Search Algorithm (HSA) is one of the<br />recent population-based optimization methods which inspired by modern-nature. HSA has confirmed its ability to<br />tackle various difficult combinatorial optimization problems like vehicle routing, exam timetabling to name a few.<br />However, as far as we are concerned, it has never been applied to tackle the BAP problem. The primary objective<br />of this article is to examine the effectiveness of HSA in solving BAP by identifying suitable values for the<br />parameters of the HSA and then applying HSA to tackle BAP. Therefore, in this article, the basic HSA is proposed<br />to tackle the BAP. The suggested HSA is tested on BAP benchmark (I3 dataset) and compared the results with<br />other latest algorithms found in the literature. The trial outcomes evidenced that the HSA is promising,<br />competitive, and that it has surpassed some other algorithms that have solved the same dataset, and the results were<br />very near to the best-known results. Experimental results also prove the suitability and applicability of HSA in<br />tackling the BAP.</span> </p> Bilal Ahmed Dr. Hazlina Hamdan Dr. Abdullah Muhammed Dr. Nor Azura Husin Copyright (c) 2024 Bilal Ahmed, Dr. Hazlina Hamdan, Dr. Abdullah Muhammed, Dr. Nor Azura Husin https://creativecommons.org/licenses/by/4.0 2024-08-11 2024-08-11 5 3 10.52866/ijcsm.2024.05.03.031 A Novel Deep Learning Approach for Classification of Bird Sound Using Mel Frequency Cepstral Coefficients https://journal.esj.edu.iq/index.php/IJCM/article/view/1491 <p> <span class="fontstyle0">Monitoring animal populations is one important matter to better understand changes in their<br />population, behavior, and biodiversity. Bird sounds are the main tool to classify bird species acoustically. The<br />sounds of birds are an indicator for ecologists as it responds to changes in their environment. The recognition<br />among a variety of bird species to get important features is computationally expensive. With the unbalanced<br />classes and scarcity of training data, the performance accuracy is degrading. This paper aims to classify species of<br />birds using lightweight convolutional neural networks (LWCNNs) basis on using a spectrogram image of Brazilian<br />bird sounds as a dataset. For extracting spectrogram images, Mel Frequency Cepstral Coefficient (MFCC)<br />algorithm is used. To prove the high performance of the classifier, ten species of birds with 10,000 spectrogram<br />images are provided to the classifier. Our LWCNN model achieved a training and testing accuracy of 99.68 % and<br />92.80 % respectively in 10.54 min with 5 epochs.</span> </p> Aymen Saad Copyright (c) 2024 Aymen Saad https://creativecommons.org/licenses/by/4.0 2024-08-18 2024-08-18 5 3 10.52866/ijcsm.2024.05.03.040 Solving tri-criteria: total completion time, total late work, and maximum earliness by using exact, and heuristic methods on single machine scheduling problem https://journal.esj.edu.iq/index.php/IJCM/article/view/1014 <p>The presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two exact methods are important; a Branch and Bound algorithm (BAB) and a complete enumeration (CEM) method are applied to solve the three proposed MSP criteria by finding a set of efficient solutions. The experimental results showed that CEM can solve problems for up to jobs. Two approaches of the BAB method were applied: the first approach was BAB without dominance rule (DR), and the BAB method used dominance rules to reduce the number of sequences that need to be considered. Also, this method can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. In addition, to find good approximate solutions, two heuristic methods for solving the problem are proposed, the first heuristic method can solve up to jobs, while the second heuristic method can solve up to jobs. Practical experiments prove the good performance regarding the two suggested approaches for the original problem. While for a sub-problem the experimental results showed that CEM can solve problems for up to jobs, the BAB without dominance rule (DR) can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. Finally, the heuristic method can solve up to jobs. Arithmetic results are calculated by coding (programming) algorithms using (MATLAB 2019a)</p> <p> </p> Nagham Muosa Neamah Bayda A. Kalaf Copyright (c) 2024 Nagham Muosa Neamah, Bayda A. Kalaf https://creativecommons.org/licenses/by/4.0 2024-06-10 2024-06-10 5 3 14 25 10.52866/ijcsm.2024.05.03.002 Prompt Engineering: Unleashing the Power of Large Language Models to Defend Against Social Engineering Attacks https://journal.esj.edu.iq/index.php/IJCM/article/view/1674 <p>Prompt Engineering is an emerging area of study that pertains to the act of conceptualizing, perfecting, and executing prompts that guide an AI model to an intended purpose. The AI model is an LLM, which they are the “hit” of our time and probably the controversial type of AI. They are capable of executing several tasks using natural language processing algorithms. Due to their ease of use and fast development, they are becoming highly dependent. We found that to interact correctly with these models and gain the best performance, several techniques should be taken into consideration. Moreover, there are additional methods or tips to write a good prompt.</p> Ahmed I. Nezer Bashar AlEsawi Wisam Makki Salim Copyright (c) 2024 Ahmed Nezer, Bashar AlEsawi, Wissam Salim https://creativecommons.org/licenses/by/4.0 2024-08-06 2024-08-06 5 3 404 416 10.52866/ijcsm.2024.05.03.024 Detection of anomalies and Data Drift in a time-series dismissal prediction system https://journal.esj.edu.iq/index.php/IJCM/article/view/1152 <p>The purpose of the study is to develop a system that automatically processes data based on existing<br />and newly entered data, especially with the aim of ensuring high data quality by detecting and eliminating<br />anomalies. The quantile filtering method, Chebyshev’s inequality, Kolmogorov-Smirnov two-sample test, and<br />others should be noted among the methods used. In the course of the research, the theoretical aspects of the<br />methods, various principles of detecting anomalies for different types of data were considered and analysed.<br />Different principles and approaches applied to anomaly detection in different contexts were explored. The results<br />of the analysis and the selection of optimal methods for detecting anomalies in various types of data are important<br />for the effective functioning of the automatic data processing system. This will make it possible to achieve<br />accuracy and reliability in the detection of anomalies and ensure high quality of data used in the machine learning<br />system.</p> Nataliya Boyko Roman Kovalchuk Copyright (c) 2024 Nataliya Boyko, Roman Kovalchuk https://creativecommons.org/licenses/by/4.0 2024-07-08 2024-07-08 5 3 229 251 10.52866/ijcsm.2024.05.03.012 An Integrative Computational Intelligence for Robust Anomaly Detection in Social Networks https://journal.esj.edu.iq/index.php/IJCM/article/view/1706 <p>Anomaly detection is very important in social networks to keep the truth, security and believability of online communities. This paper presents Adapto Detect which uses a fresh anomaly detection scheme named Pufferfish Optimization Technique (POT) for selecting features and Graph Embedding Autoencoder (GEAE) as an anomaly identifier. POT can pick out vital features from social network data well, it concentrates on attributes necessary for spotting anomalies. At the same time, GEAE is also learning low-dimensional representations of graph nodes. This helps to capture more complicated patterns and relationships within the structure of the graph. These embeddings are used for efficient anomaly detection, which shows deviations from regular social network model behaviour. The performance of AdaptoDetect is superior as shown by its thorough evaluation and comparison with existing methods on different social network datasets and situations. The POT and GEAE interaction in AdaptoDetect allows it to adjust for network alterations and effectively handle anomalies. In general, this system offers a strong answer that can easily identify irregularities within social networks – boosting their security, toughness, and trustworthiness online.</p> Helina Rajini Suresh Vallem Ranadheer Reddy Sangamithrai K Hirald Dwaraka Praveena Gnanaprakasam C Sakthi Lakshmi Priya C Copyright (c) 2024 Helina Rajini Suresh, Vallem Ranadheer Reddy, Sangamithrai K, Hirald Dwaraka Praveena, Gnanaprakasam C, Sakthi Lakshmi Priya C https://creativecommons.org/licenses/by/4.0 2024-09-07 2024-09-07 5 3 10.52866/ijcsm.2024.05.03.047 Intelligent Household Load Identification Using Multilevel Random Forest on Smart Meters https://journal.esj.edu.iq/index.php/IJCM/article/view/1219 <p> <span class="fontstyle0">A load identification approach for residential intelligent meters using a random forest (RF)<br />algorithm is employed to guarantee the secure and cost-effective functioning of the electricity grid. In this study,<br />the load data from a smart meter in a home was pre-processed to remove any gaps, noise, or inconsistencies before<br />making any predictions by using the random forest method. The power quality (PQ) features, current features, and<br />Voltage-Current (V-I features), as well as the forecast findings and mathematical tools were used to recognise the<br />load. Using these tools, the household intelligent meters utilising the random forest algorithm, features, harmonic<br />characteristics, and instantaneous characteristics were extracted to form the load characteristics, and the objective<br />function of load identification was generated based on a set of features. The findings of this comparative study<br />demonstrate that employing this technique can reduce identification errors and boost productivity by a full two<br />seconds. The proposed approach, based on a random forest technique, improved home power savings rate by<br />99.2% and the load management efficiency by 98.6%.</span> </p> Israa Al-Mashhadani Waleed khaled Copyright (c) 2024 Israa Al-Mashhadani, Waleed khaled https://creativecommons.org/licenses/by/4.0 2024-07-31 2024-07-31 5 3 330 340 10.52866/ijcsm.2024.05.03.019 Improves Intrusion Detection Performance In Wireless Sensor Networks Through Machine Learning, Enhanced By An Accelerated Deep Learning Model With Advanced Feature Selection https://journal.esj.edu.iq/index.php/IJCM/article/view/1731 <p>Wireless Sensor Networks (WSNs) have been securing a big position in the new aspect of security network attacks, where these suffer from various serious cyber threats that can play with their data integrity and reliability. Due to the key importance of WSN in a wide spectrum range of applications such as environmental monitoring and military field, building reliable, robust and efficient intrusion detection systems (IDS) is necessary. Although traditional machine learning approaches have been intended to detect these threats, they often lack high accuracy due to the complexity and dimensionality of WSN data.</p> <p>To address these limitations, the study introduces an innovative approach that greatly improves intrusion detection performance in WSNs by combining a high-speed deep learning model with sophisticated feature selection methods. The newly developed system underwent extensive testing using the WSN-DS dataset and applied Gaussian Naive Bayes (GNB) and Stochastic Gradient Descent (SGD) algorithms within the machine learning framework. The outcomes were exceptional, demonstrating a flawless accuracy rate of 100% and representing a significant advancement compared to prior methodologies based solely on traditional machine learning techniques.</p> <p>The study illustrates how the fusion of deep learning and optimized feature selection effectively addresses the distinctive challenges presented by WSN environments. The results not only present a highly precise and effective method for intrusion detection but also lay the groundwork for further research focused on fortifying the security of sensor networks against progressively intricate cyber threats.</p> Hadeel M. Saleh Hend Marouane Ahmed Fakhfakh Copyright (c) 2024 Hadeel M. Saleh, Hend Marouane, Ahmed Fakhfakh https://creativecommons.org/licenses/by/4.0 2024-08-29 2024-08-29 5 3 10.52866/ijcsm.2024.05.03.050