It has been nearly three decades since the first strain of ransomware surfaced online, but still, it is one of the most destructive malwares of all time, costing millions of dollars around the globe each year. Ransomware ...
In the field of sentiment analysis, most of research has conducted experiments on datasets collected from Twitter for manipulating a specific language. Little number of datasets has been collected for detecting sentiments ...
It is well known that nowadays the security issues in the information system are increased in noticed way. These issues include the hardware and software sides, in terms of data or information as well as the devices. One ...
Saadoon, Hawraa J; Jamel, Thamer M; Khazal, Hasan F(2022-02-15)
In order to design and planning for the next generation wireless communications system, for the channel, it is important to use a suitable model for predicting appropriate and optimum frequencies. This paper is regarded ...
Yousif, Noor A; Naji, Diyar J; Al-Khazraji, Ayman; Raafat, Safanah M(2022-02-15)
A health care system (HCS) has promptly progressed owing to the increasing need for accurate reactions in seriously urgent situations of health, especially for elderly people. The well-being of patients throughout the ...
Predicting enemy movements on the battlefield, especially when military raids occur is one of the important factors in battle winning. The enemies may be far away or hidden, but sounds are heard. Based on sounds that are ...
Al-Khamees, Hussein A. A.; H. Al-Jwaid, Waleed Ridha; Al-Shamery, Eman S.(2022-02-15)
Artificial Intelligence (AI) is considered a robust tool that is widely used in different computer tasks. Machine Learning (ML) as an essential type of AI and deep learning (DL) is merely a branch of (ML). DL can mainly ...
The focal point of this work was to build a troubleshooting mobile application, which provides an alert notification when RT (Radio Transmission) failures happen at radio outstations and enables predicting the possibilities ...
As the Internet is growing very fast, the Domain Name System remains under constant attacks and day by day its vulnerability is increasing. In the cyberattacks, it has been shown that the maximum attackers make target on ...
Reporting duplicated bugs in bug reports have serious productivity consequences on software projects. The fewer reporting of duplicated bugs, the better software maturity processes are set between the internal software ...
El Aidos, Fatima Ezzahra; Kassab, Meryem; Benamar, Nabil; Falah, Bouchaib(2022-02-15)
COVID-19 pandemic has taken the world by surprise in the beginning of 2020. Initially detected in Wuhan, China, the newly discovered coronavirus has spread all over the world in a short time, which pushed the World Health ...
Narmeen, Mehak; Khan, Hamza Wazir; Fatima, Mehak; Ghani, Fatima; Sattar, Mian Usman; Azad, Mueen-ud-Din(2022-02-15)
The world has been drastically affected by the 2019 novel corona-virus outbreak, otherwise known as COVID-19. Pakistan is no exception to this, and the virus has rapidly spread within the country in the first quarter of ...
Iqbal, Kashif; A. Khan, Salman; Anisa, Shamim; Tasneem, Ayesha; Mohammad, Nazeeruddin(2022-02-15)
Email security has been a major concern in for a long time. One important aspect of e-mail security is effective and efficient
detection of spam e-mails, which is an added overhead in the proper functioning of modern email ...
Pakkiraiah, C.; Satyanarayana, Dr. R.V.S.(2022-02-15)
A binary adder is a primary component of many high-performance architectures like Digital Signal Processing (DSP), Image Processing, and Multimedia Processing. The design of a suitable binary adder in terms of power ...
Eskandarnia, Elham M.; Al-Ammal, Hesham M.(2022-02-15)
The field of smart meter data analytic is a relatively young field that grew because of the wealth of data generated from the use of smart meters. This data has been used for several sustainability applications including ...
Sabnis, Ms. Poorva Sanjay; Joshi, Dr. S.D.(2022-02-15)
The important characteristics of a software quality assurance system is software reliability. It is the probability of error-free software process in a given environment for a given interval. A huge number of research ...
Sridharan, Srivatsan; V, Nirmal; Soundar, Sachin; N, Maheswari(2022-02-15)
Paralysis is the loss of muscle control in parts of or the whole body. Only 15% of people affected by paralysis are employed, due to concerns over their ability to function properly. These patients are able to think and ...
Voice over Internet Protocol (VoIP) is a popular and important internet protocol for real-time voice calling. It is used in several software applications such as Skype, WhatsApp, and Google Talk. However, communications ...
Gas pipeline inspection and monitoring are essential to preventing rupturing with its associated human, economic and environmental costs. Currently, the popular approaches utilized in monitoring gas pipelines are expensive ...
Gerguis, Michel Naim; El-Kharashi, M. Watheq; Salama, Cherif(2022-02-15)
This paper introduces ClassifyWiki, a framework that automatically generates Wikipedia-based text classifiers using a small set of positive training articles. ClassifyWiki aims to simplify the process of collecting hundreds ...