Adel Ali Al-zebari

Adel Ali Al-zebari
Duhok Polytechnic University | DPU · Information Technology

Doctor of Information Technology

About

21
Publications
15,682
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
283
Citations
Citations since 2017
20 Research Items
282 Citations
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140

Publications

Publications (21)
Conference Paper
Full-text available
Abstract—Forest fires are a serious environmental concern that causes economic and ecological harm as well as puts human lives in danger. Controlling such a condition necessitates quick identification. One option is to employ artificial intelligence (AI) techniques based on some measurements, such as those supplied by meteorological stations. Meteo...
Article
Full-text available
The term "Real-Time Operating System (RTOS)" refers to systems wherein the time component is critical. For example, one or more of a computer's peripheral devices send a signal, and the computer must respond appropriately within a specified period of time. Examples include: the monitoring system in a hospital care unit, the autopilot in the aircraf...
Article
The use of technology has grown dramatically, and computer systems are now interconnected via various communication mediums. The use of distributed systems (DS) in our daily activities has only gotten better with data distributions. This is due to the fact that distributed systems allow nodes to arrange and share their resources across linked syste...
Article
Full-text available
Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensur...
Article
Full-text available
Distributed systems, which may be utilized to do computations, are being developed as a result of the fast growth of sharing resources. Data mining, which has a huge range of real applications, provides significant techniques for extracting meaningful and usable information from massive amounts of data. Traditional data mining methods, on the other...
Article
Full-text available
Web of thing (WoT) is a gifted answer for interface and access each gadget through the web. Consistently the gadget includes increments with huge variety fit as a fiddle, size, use and intricacy. In this paper Since WoT drives the world and changes individuals' lives with its wide scope of administrations and applications. In any case, WoT offers v...
Article
Full-text available
Many applications in the real world include optimizing specific targets, such as cost minimization, energy conservation, climate, and maximizing production, efficiency, and sustainability. The optimization problem is strongly non-linear with multifunctional landscapes under several dynamic, non-linear constraints in some instances. It is challengin...
Article
Full-text available
The Internet of Things (IoT) is a collection of objects such as sensors, actuators, and processors, which interconnected within a specific network to perform a task collaboratively. The IoT is one of the prevalent technologies, which has developed dramatically in recent years. Its reputation derives from its relevance and role in employing things i...
Article
In this paper, a deep-rhythm-based approach is proposed for the efficient detection of drowsiness based on EEG recordings. In the proposed approach, EEG images are used instead of signals where the time and frequency information of the EEG signals are incorporated. The EEG signals are converted to EEG images using the time-frequency transformation...
Article
Full-text available
Information security and confidentiality are the prime concern of any type of communication. The techniques that utilizing inconspicuous digital media such as text, audio, video and image for hiding confidential data in it are collectively called Steganography. The key challenge of steganographic system design is to maintain a fair trade-off betwee...
Article
Full-text available
According to the W3C, the semantic web is the future of the www. The data that is based on the semantic web can be understood by machines and devices. The main component of the semantic web is the ontology, which is known as the backbone of the semantic web. There are many tools used to edit and create an ontology, however, few kinds of research co...
Conference Paper
Abstract—In this paper, the performance comparison of the machine learning techniques on diabetes disease detection is carried out. Diabetes disease attracts great attention in the machine learning community. Because diabetes is a chronic disease and needs to be detected at an early stage in order to deal with the correct medication. A series of ma...
Article
Full-text available
Visualization tools of ontology help users to understand the form of ontologies. There are an enormous number of tools used to visualize ontologies where most of them use graphical approaches to visualize ontology elements. The main aim of Visualization Notation for OWL Ontologies is to help users who are less familiar with ontologies to understand...
Article
Full-text available
The amount of information on the web and it is unstructured nature. The order and structure of the information are very important. So, to reach this information in an easy way is to use an ontology for a specific domain. The word ontology used in many domains to organize web gain. The semantic web is considered as intelligent webs. This paper aims...
Article
Full-text available
Many web applications represented as Electronic-Learning Management Systems (EMLS), such as Moodle, e-Front, etc. are used to remote the educational courses. The educational resources will be available for users which can be accessed through the web anytime and anywhere. Thus, using EMLS will make the information available for the learners through...
Article
Full-text available
Peer to Peer file sharing systems are discussed in a lot of academic research. Many Peer to Peer applications are available which work on the computer and mobile, such as Gnutella, Napster, Bittorent, and SymTorrent. File sharing causes a lot of the traffic on the network, thus some of the technology is used to reduce the traffic and find the files...

Questions

Question (1)
Question
Hello All......
I am trying to query and read the ontology using Eclipse and JENA. When I run the java class I got this error. please, need help urgent!!!
Exception in thread "main" java.lang.NoClassDefFoundError: com/hp/hpl/jena/iri/IRIFactory
at com.hp.hpl.jena.rdf.arp.impl.XMLHandler.<init>(XMLHandler.java:431)
at com.hp.hpl.jena.rdf.arp.impl.RDFXMLParser.<init>(RDFXMLParser.java:40)
at com.hp.hpl.jena.rdf.arp.impl.RDFXMLParser.create(RDFXMLParser.java:83)
at com.hp.hpl.jena.rdf.arp.JenaReader.<init>(JenaReader.java:77)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(Unknown Source)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(Unknown Source)
at java.lang.reflect.Constructor.newInstance(Unknown Source)
at java.lang.Class.newInstance(Unknown Source)
at com.hp.hpl.jena.rdf.model.impl.RDFReaderFImpl.getReader(RDFReaderFImpl.java:113)
at com.hp.hpl.jena.util.FileManager.readModelWorker(FileManager.java:387)
at com.hp.hpl.jena.util.FileManager.loadModelWorker(FileManager.java:297)
at com.hp.hpl.jena.util.FileManager.loadModel(FileManager.java:248)
at main.main.main(main.java:11)
Caused by: java.lang.ClassNotFoundException: com.hp.hpl.jena.iri.IRIFactory
at java.net.URLClassLoader.findClass(Unknown Source)
at java.lang.ClassLoader.loadClass(Unknown Source)
at sun.misc.Launcher$AppClassLoader.loadClass(Unknown Source)
at java.lang.ClassLoader.loadClass(Unknown Source)
... 15 more

Network

Cited By

Projects

Project (1)
Project
Design and Implement an e-learning system based on semantic wen technologies