
Renas Rajab Asaad- Managing Director at Qubahan Academic Journal
- Senior Lecturer at Independent Researcher
Renas Rajab Asaad
- Managing Director at Qubahan Academic Journal
- Senior Lecturer at Independent Researcher
About
63
Publications
68,040
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
659
Citations
Introduction
Renas Rekany currently is a senior lecturer at the computer science, Nawroz University, Duhok. I do researches in Artificial Intelligence and Algorithms. And I'm the Managing Director of Qubahan Academic Journal
Current institution
Independent Researcher
Current position
- Senior Lecturer
Publications
Publications (63)
The classification's traffic is regarded as a significant study domain because to the rising demand among network users. In addition to improving the identification of network services and addressing difficulties related to the security of traffic networks, it also simplifies and improves the accuracy of a broad variety of Internet application mode...
The optimization of Artificial Intelligence (AI) systems is critical for improving performance, scalability, and adaptability across various real-world applications. This paper explores key optimization techniques, including algorithmic enhancements, hardware acceleration, software tools, and data preprocessing. Challenges such as resource constrai...
The rapid evolution of machine learning (ML) and artificial intelligence (AI) has led to groundbreaking advancements in computational models, empowering applications across diverse domains. This paper provides an in-depth exploration of advanced ML architectures, including transformers, Graph Neural Networks (GNNs), capsule networks, spiking neural...
The Cuckoo Search Algorithm (CSA), introduced by Xin-She Yang and Suash Deb in 2009, is a nature-inspired metaheuristic optimization technique modeled on the brood parasitism behavior of certain cuckoo bird species. Utilizing a Levy flight mechanism, CSA effectively balances global exploration and local exploitation, making it a versatile tool for...
In this work, we propose a singular approach for blast identification and classification in Acute Lymphoblastic Leukemia (ALL), an ordinary kind of formative child cancer dataset. The proposed method combines the Pivot-Growing Segmentation (PGS) algorithm with the U-Net structure better with Parametric Leaky ReLU (PLR) activations. The Pivot-Growin...
The rapid expansion of data on air contaminants and climate change, particularly concerning public health, presents both opportunities and challenges for traditional epidemiological methods. This study aims to address these challenges by exploring advanced data collection, pattern identification, and predictive modeling techniques in the context of...
Parkinson's disease (PD) presents a growing global health challenge, with early detection being crucial for effective management and treatment. This study seeks to develop an innovative machine learning (ML) framework for the early detection of PD by integrating advanced techniques for data preprocessing, dimensionality reduction, feature selection...
Researchers and investors can accelerate the development of innovative materials, methods, and procedures by using machine learning technologies. In materials science, one key objective of employing such methods is to make it easier to identify and quantify high features throughout the chain of manipulation, organization, possessions, and efficienc...
In the rapidly evolving landscape of smart homes powered by Internet of Things (IoT) devices, the twin specters of safety and privacy loom large, exacerbated by pervasive security vulnerabilities. Confronted with a heterogeneous array of devices each with unique Value of Service (QoS) requirements, devising a singular network management strategy pr...
In response to escalating energy consumption, particularly within the housing sector, a global imperative to reduce energy usage has emerged, propelling the concept of "smart houses" to the forefront of innovation. This paradigm shift owes its genesis to the convergence of advancements in energy conversion, communication networks, and information t...
As cloud computing becomes increasingly integral to data management and services, security and privacy concerns remain paramount. This article presents a comprehensive review of the current protocols and mechanisms designed to fortify security and privacy in distributed cloud environments. It synthesizes contributions from various research works, e...
Objective: This article examines the factors influencing the awareness and adoption of International Public Sector Accounting Standards (IPSAS) in public units in Vietnam. It seeks to identify key challenges and drivers that affect the understanding and implementation of these standards. Methods: The study uses a survey methodology, gathering respo...
Today, computer vision is considered one of the most important sub-fields of artificial intelligence, due to the variety of its applications and capabilities to transfer the human ability to understand and describe a scene or image to the computer, so that it becomes able to recognize objects, shapes, colors, behavior and other capabilities of unde...
Recent progress in deep learning methods has shown that key steps in object detection and recognition, including feature extraction, region proposals, and classification, can be done using ImageAi libraries. Object detection is a computer vision technique that works to identify and locate objects within an image or video. Specifically, object detec...
Artificial intelligence (AI) applications and technologies aim to increase the intelligence of the machines and computers around us, while virtual reality (VR) and augmented reality (AR) technologies aim to create an entirely new scene that cannot be physically touched but is perceptually perceptible through a variety of artificial visual and audit...
Cloud computing technology is the most widely used current application. Due to the strength of the infrastructure, the ease of providing services, and its speed, it is scalable and expandable, and it has many characteristics. Despite all that has been mentioned about cloud computing, it faces many problems. Like flexibility and security which is it...
Technical analysis studies chart patterns, using indicators based on past price action data to predict future trends. Technical analysis involves mathematical calculations based on an asset’s price or volume, with the results used to predict future prices and can indicate a market trend or warnings that the trend is about to reverse. No single indi...
A database is a collection of data that can be classified into two types: SQL (structure query language), which is associated with relational databases, and NoSQL (non-relational SQL), which is associated with distributed databases. As the world becomes increasingly technologically advanced and computerized, the amount of information grows exponent...
A database is a collection of data that can be classified into two types: SQL (structure query language), which is associated with relational databases, and NoSQL (non-relational SQL), which is associated with distributed databases. As the world becomes increasingly technologically advanced and computerized, the amount of information grows exponent...
Because of technology, a large number of portable devices, and the great use of networks and the need for them in education, industry, and politics. This widespread has led to the emergence of a huge amount of data, and securing this data has become a very important matter. Big data refers to a very large number of data collected from different sou...
CALL FOR PAPER
Qubahan Academic Journal (QAJ) is inviting your articles, review articles, case studies, conference proceedings, and short communication on all topics of Scientific and Management Research. QAJ welcomes quality work that focuses on research, development, and review. We are looking forward to strict compliance with the modern age sta...
Nowadays, deep learning is the most common field in artificial intelligence, deep learning is a technique invented by man in order to try to imitate the way the human mind works. Deep learning tries to simulate the human mind in all its capabilities, which include; Seeing, understanding speech, composing it, hearing, and other powerful abilities th...
Current networking technologies, as well as the ready availability of large quantities of data and knowledge on the Internet-based Infosphere, offer tremendous opportunities for providing more abundant and reliable information to decision makers and decision support systems. The use of the Internet has increased at a breakneck pace. Some prevailing...
Qubahan Academic Journal (QAJ) is a quarterly academic journal published by the Qubahan Organization for Development. QAJ publishes original researches in all areas of Science and Social Science. QAJ is a Peer-Reviewed Open Access journal. QAJ provides immediate, worldwide, barrier-free access to the full text of research articles without requiring...
ARTICLEINFO The complexity of real-world problems motivated researchers to innovate efficient problem-solving techniques. Generally natural Inspired, Bio Inspired, Metaheuristics based on evolutionary computation and swarm intelligence algorithms have been frequently used for solving complex, real-world optimization and Non-deterministic polynomial...
Swarm based optimization algorithms are a collection of intelligent techniques in the field of Artificial Intelligence (AI) were developed for simulating the intelligent behavior of animals. Over the years ago, problems complexity increased in a means that it is very difficult for basic mathematical approaches to obtain an optimum solution in an op...
In this article, we'll learn about the concepts of instruction organized in computer organization. On the premise of accessibility of ALU operands sorts of CPU organization is moreover endorsed in this article. When the constructing agent forms an Instruction it changes over the instruction from its memory helpers shape to standard machine language...
Recent days, the concept of data mining and the need for it, its objectives and its uses in various fields, explain its procedures and tools, the type of data that is mined, and the structural structure of that data while simplifying the concept of databases, relational databases and the query language. Explain the benefits and uses of mining or mi...
Recently, we humans integrate into the world of our smart phones and our portable electronic devices to the point that that world can numb us in one way or another and separate us from the real world, so that we and the generations that come after us are fully adapted to dealing with huge amounts of digital information, so they are ready to be abso...
This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking. The brute-force attack is also recognized as a detailed search, where it attempts guessing the targ...
Free Publication Fees Issue! Indexed in: Google Scholar Crossref (DOI): 10.48161 ISSN: 2709-8206 Manuscripts are peer-reviewed and a first decision is provided to authors within 2 weeks after submission. Qubahan Academic Journal (QAJ), a peer-reviewed journal.
Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or destroying. A strong virus must have automatic multiplication, automatic transmission between devices,...
Nowadays, the amount of giving birth is increasing by amount of death, these days there are have many death causes (diseases) , in different ways, and there's different death causes in every region, In north of Iraq there is a governorate called Duhok, population of Duhok's governorate is nearly about 1.011.585 people in 2019. Descriptive tabulatio...
Today Big Data, is any set of data that is larger than the capacity to be processed using traditional database tools to capture, share, transfer, store, manage and analyze within an acceptable time frame; from the point of view of service providers, Organizations need to deal with a large amount of data for the purpose of analysis. And IT departmen...
Back propagation neural network are known for computing the problems that cannot easily be computed (huge datasets analysis or training) in artificial neural networks. The main idea of this paper is to implement XOR logic gate by ANNs using back propagation neural network for back propagation of errors, and sigmoid activation function. This neural...
The AR Self Learning Application is an educational project that base on augmented reality using AR Foundation package which is combination between ARkit and ARCore, the main idea of project is self-learning without needing any tutor as it show in front of user a 3D character which will be user’s private tutor, it introduce each section and start te...
Swarm Intelligence is an active area of researches and one of the most well-known high-level techniques intended to generat, select or find a heuristic that optimize solutions of optimization problems.Elephant Herding optimization algorithm (EHO) is a metaheuristic swarm based search algorithm, which is used to solve various optimi-zation problems....
Recently, theoretical arguments, numerical simulation and experiments shown that ion channel noise in neurons can have deep impact on the behavior of the neuron's dynamical when there is a limited size for the membrane space. It can be create different models of Linaro al equations by using stochastic differential equations to find the impacts of i...
Recently, the mobile application become a big service that’s make users easy manage the data over the server. The Application consist several sections. First section the Front End used is Swift Language in Xcode platform with MySQL and web server. Second section the Back End used is MySQL. In this paper there are several modules such as Data Entry...
Elephant Herding optimization algorithm (EHO) is a metaheuristic swarm based search algorithm, which is used to solve various optimization problems. EHO can be used to solve as benchmark problems, Services Selection in QoS-Aware Web Service Compositions, Energy-Based Localization, PID controller tuning, Appliance Scheduling in Smart Grid identifica...
Swarm intelligence is a relatively new approach to problem solving that takes inspiration from the social behaviors of insects and other animals. Ants, in particular, have inspired a number of methods and techniques among which the most studied and successful is the general-purpose optimization technique, also known as ant colony optimization, In c...
Cryptography is a science concerned with securing data transmission. By applying cryptographic operations to data, readable information is converted into unreadable data. Currently, security is of great importance. Data transferred over the internet must have some form of encryption. Different forms of multimedia contents are moved over the interne...
There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce...
Digital images can be changed easily nowadays through the use of sophisticated software to edit images such as (Adobe
Photoshop®). You can look at some manipulated pictures along the lines of the original images without any suspicion that they
are also modified. Accordingly, the use of such software to edit the image makes ratification a difficult...
There is great research going on in the field of data security nowadays. Protecting information from disclosure and breach is of high importance to users personally and to organizations and businesses around the world, as most of information currently are sensitive electronic information transferred over the internet and stored in cloud based syste...
Digital images can be changed easily nowadays through the use of sophisticated software to edit images such as (Adobe Photoshop®). You can look at some manipulated pictures along the lines of the original images without any suspicion that they are also modified. Accordingly, the use of such software to edit the image makes ratification a difficult...
In latest years, it has been argued theoretically both by experiments and by numerical simulations that noise of ion channel in neurons effect on the dynamical behavior of neuron when the size of membrane area is limited. Different models that extend the Hodgkin-Huxley equations into stochastic differential equations to capture the effects of ion c...