Papers by Yasmin M. Mohialden
Journal La Multiapp, 2021
This research examines the Internet Protocol (IP) versions 4, 5, and 6, as well as the difference... more This research examines the Internet Protocol (IP) versions 4, 5, and 6, as well as the differences between them and which protocol is more suitable for the future of the internet, among other things. Through this research, we have established the most advantageous characteristics of these protocols, as well as the specific elements that each protocol uses to allow the internet network to operate at maximum capacity. The main aim of this study is to discover which of the internet protocols, IPv4, IPv5, or IPv6, is the most widely used. IPv4 is the most widely used protocol, followed by IPv5. The most essential elements of getting a more relevant job on the internet network are highlighted in this article. It all comes down to how IP protocols operate and what they accomplish.

Analysis of Use of Social Networking Sites for the Education by Ministry of Higher Education
Young students tend to use social networking sites frequently. Idea is to offer useful contents f... more Young students tend to use social networking sites frequently. Idea is to offer useful contents for study. Online social networking sites like Facebook are useful? Analysis of this OSN for education is discussed in this paper. If the OSN like Facebook is not enough, then is it possible to use any other social networking site? The thrust is on social networking site because young generation is more fascinated with social networking sites. Attempt is to use their interest and engage them in a study. Ministry of higher education accomplishes their various activities by using the Facebook page on social networking site—Facebook. Use of the private social networking site for the sake of information and broadcasting is useful, but use of OSN for official use where data and accounts are linked is not advisable considering the security concerns. Comparative analysis of Facebook and Edmodo is performed where Edmodo outperforms Facebook for education and data privacy.
A Novel Approach to Arabic Chabot, Utilizing Google Colab and the Internet of Things: A Case Study at a Computer Center
Webology, Dec 23, 2021
A Chabot is a software program for humans to interact with natural-language computers. It has num... more A Chabot is a software program for humans to interact with natural-language computers. It has numerous applications in business, service, education, and healthcare, among others. Arabic Chabot’s, on the other hand, fight to generate and display Arabic characters correctly because of linguistic problems. In this paper, we propose a new method for the development of effective Arabic Chabot’s, which is improved by the use of the Internet of things (IOT). An experiment was performed utilizing Google Colab and the Python Chatterbot library to build and deploy an Arabic Chabot for a computer center based on IOT.
IOT-Based Document Tracking Software Development Process
Social Science Research Network, 2023

Enhancement of ChatGPT using API Wrappers Techniques
Maǧallaẗ ʻulūm al-mustanṣiriyyaẗ, Jun 30, 2023
This study looks at how API (Application Programming Interface) wrapper technology can make it ea... more This study looks at how API (Application Programming Interface) wrapper technology can make it easier to use complex functions by putting together a lot of API calls. These packages have non-real-time interfaces that are hard to use. ChatGPT is a chatbot-specific GPT-3 language paradigm. It lets developers create chatbots that respond intelligently to natural language user input, creating a more engaging user experience. This article shows that ChatGPT, Python, and API wrapper technology may be used to develop a smart chatbot. We show how to use the OpenAI API library to add ChatGPT to Python programs. This makes it easier for developers to make chatbots that sound and act more like real people when they talk. Our contribution to this field is showing that it is possible to make smart chatbots with ChatGPT and API wrapper technology. To reach this goal, we use a system that combines the OpenAI API with ChatGPT and Python. This gives us valuable information about how to make smart chatbots. The efficiency of the system has been tested many times while applying it to different environments, and the results are satisfactory.
Real-Time Human Action Recognition with Multimodal Dataset: A Study Review
Lecture notes in electrical engineering, 2023

Bulletin of Electrical Engineering and Informatics, Aug 1, 2020
The scale of data streaming in social networks, such as Twitter, is increasing exponentially. Twi... more The scale of data streaming in social networks, such as Twitter, is increasing exponentially. Twitter is one of the most important and suitable big data sources for machine learning research in terms of analysis, prediction, extract knowledge, and opinions. People use Twitter platform daily to express their opinion which is a fundamental fact that influence their behaviors. In recent years, the flow of Iraqi dialect has been increased, especially on the Twitter platform. Sentiment analysis for different dialects and opinion mining has become a hot topic in data science researches. In this paper, we will attempt to develop a real-time analytic model for sentiment analysis and opinion mining to Iraqi tweets using spark streaming, also create a dataset for researcher in this field. The Twitter handle Bassam AlRawi is the case study here. The new method is more suitable in the current day machine learning applications and fast online prediction.
Using GPU and TPU Hardware Accelerators to Develop a Cloud-Based Genetic Algorithm System
Lecture notes in electrical engineering, 2023

Journal La Multiapp, Jun 20, 2022
As a result of the COVID-19 epidemic, there has been an increase in the demand for electronic edu... more As a result of the COVID-19 epidemic, there has been an increase in the demand for electronic education apps in schools and colleges in recent years. The purpose of this paper is to develop an educational application for chemistry students at different levels of study that will allow them to obtain precise information on chemical substances in a timely and safe manner. This program uses a web scraping technique by applied a RESRful API to extract information from websites, which is then sent to the student's account. Furthermore, due to the use of the Internet of Things, the application has an anti-explosives and narcotics property using (IOT). The application can retrieve and save information entered by the user on chemical compounds with a high level of security. The medication's chemical formula, as well as the covalent and ionic bonding of compounds, can be displayed. It also has a database that lists all of the hazardous substances. If a user enters a dangerous compound containing narcotics more than four times, an alarm message is sent to the administrator via the Internet of Things.

RESTful API Design for a Real-Time Weather Reporting System
Lecture notes in networks and systems, 2021
A real-time weather information system is an urgent need in characterizing qualitative data. It c... more A real-time weather information system is an urgent need in characterizing qualitative data. It can provide accurate weather minute data based on the Internet of Things (IoT). The present weather reporting system is developed using the REST API technique to detect and provide information on climatic changes associated with air quality using different web sources. The used method has the ability to extract the API member set and is supported by an efficient searching interface. The proposed method observes significant searchability of API member sets by using inclusion graphs and is automatically extracted from the source code. The proposed method incorporates four sites to compare and select the proper state of air pollution. Moreover, the system is able to provide an alert message to specify the weather conditions in real time from the Real-Time Air Quality index, IQAir, AirNow, and BreezoMeter. The system has successfully shown real-time information on the weather of a particular place with efficiency and usability responses.

An improved life cycle for building secure software
IOP conference series, Jun 1, 2020
Computers advanced very fast technologically In recent times. This progress leads to high demand ... more Computers advanced very fast technologically In recent times. This progress leads to high demand for more secure systems because sophisticated security problems have arisen. Since modern systems involve several areas of expertise, it is vital for the security engineer to follow an efficient and optimum approach and to take into consideration the mathematical and physical properties of the system. In the present study, the focus was placed on specific aspects of secure software building; the primary objective is to provide efficient and secure software in terms of resources and time. The designer should keep, as well, productivity, security and cost aspects in balance. Safe system requirements are continuously changing. Therefore, the designers should be aware of these changes. At the start of this research, the researchers distributed a survey about the security-engineering principles related to the life cycle of software engineering life and secure web systems. From the data acquired, the proposed method was developed and presented as a secure e-mail system built according to the engineering principles of software. The AHP (Analytic Hierarchy Process) technique correlated with composition operator have been used for finding the optimal concerns of software requirements and keep minimum maintenance and cost effect.

Xinan Jiaotong Daxue Xuebao, 2019
Biometrics is the science and technology dealing with the measurement and analysis of the biologi... more Biometrics is the science and technology dealing with the measurement and analysis of the biological features of the human body. The analysis is based on comparing the value of certain measured features with the form features in the database. Unimodal Biometric Systems have many limitations regarding precision in the identification/authentication of personal data. To accurately identify a person, a multimodal biometrics system such as combining face and fingerprint characteristic is used. Many such multi-biometrics fusion possibilities exist that can be utilized as an authentication system. In this paper, we present a new authentication system of the multimodal biometrics method for both face and fingerprint characteristics based on general shape feature fusion vectors. There are two main phases in our method: first, the fused shape features for both face and fingerprint images are extracted in accordance with central moments, and second, these features were recognized for retrieval of an authorized person using direct Euclidian distance. Experimentally, we tested about 100 shape features vectors, and observed that our method allows to improve the multimodal biometrics model when we are using the same features for two biometric images. A new method has a high-performance precision when invariant moments are used to extract shape features vectors and when similarity measurements computed based on direct Euclidean distance in the experiments are performed. We recorded False Acceptance Rate, False Rejection Rate, and Accuracy, FAR and FRR where the accuracy of the model is 91 %.
International journal papier advance and scientific review, May 25, 2023
The Internet's core is TCP/IP, which stands for Transmission Control Protocol/Internet Protocol. ... more The Internet's core is TCP/IP, which stands for Transmission Control Protocol/Internet Protocol. It connects network devices on the internet via communication protocols. Python has several TCP/IP packages due to its popularity and flexibility. This paper describes the most popular Python libraries for TCP/IP protocol implementation, including socket, asyncio, Twisted, and Scapy. To help developers choose a library, we compare its benefits, cons, and areas of use, including criteria other than speed and memory utilization. When making web apps, choose wisely.
An Overview of Fraud Applications and Software on Social Media
Advances in multimedia and interactive technologies book series, Jan 3, 2023
Journal La Multiapp, Jun 20, 2022
With the increasing complexity of programs comes an increased focus on ensuring the quality of th... more With the increasing complexity of programs comes an increased focus on ensuring the quality of these programs. Essentially, it depends on improving the methods of testing the quality of these programs in the two phases of building these programs and after their operation. Therefore, we are developing software testing methods and methodologies. This paper aims to discuss software testing methods and their classifications according to their main properties and any software that suits each method. The majority of the literature on software testing methods and techniques is also included.
Indonesian Journal of Electrical Engineering and Computer Science, Aug 1, 2020
A gas leaks lead to personal and financial damage. Much effort has been dedicated to preventing s... more A gas leaks lead to personal and financial damage. Much effort has been dedicated to preventing such leaks and developing reliable techniques for leak detection and leakage localization using sensors. These sensors usually sound an alarm after detecting a dangerous gas in its vicinity. This paper describes a system for detecting a gas leakage from cylinders which notifies the user via the GSM network. The system consists of an LPG gas leakage detector which sends a warning signal to Arduino Uno Microcontroller. The system uses the GSM network to send notifications, a liquid crystal display (LCD) monitor to display the warning message and buzzer to sound the alert.
An Efficient Method for IoT Cross-Platform Backup Software

International journal papier advance and scientific review, Jul 4, 2022
Big data is the key to the success of many large technology companies right now. As more and more... more Big data is the key to the success of many large technology companies right now. As more and more companies use it to store, analyze, and get value from their huge amounts of data, it gets harder for them to use the data they get in the best way. Most systems have come up with ways to use machine learning. In a real-time web system, data must be processed in a smart way at each node based on data that is spread out. As data privacy becomes a more important social issue, standardized learning has become a popular area of research to make it possible for different organizations to train machine learning models together while keeping privacy in mind. Researchers are becoming more interested in supporting more machine learning models that keep privacy in different ways. There is a need to build systems and infrastructure that make it easier for different standardized learning algorithms to be created. In this research, we look at and talk about the unified and distributed machine learning technology that is used to process large amounts of data. FedML is a Python program that let machine learning be used at any scale. It is a unified, distributed machine learning package.

Development of multiple computer-based testing system using open source programing model
Journal of physics, Feb 1, 2021
The traditional methods of examination process is often characterized by human errors, question l... more The traditional methods of examination process is often characterized by human errors, question leakage and recording of score. In this study, the active application for generating multiple exam modules based on different types of e-exams have been presented. The first user is the instructor who submits the required exam questions based on suitable scores and different evaluation scales. The final user is the student who can find many selected e-exam modules by using PC screen interface. An Immediate scoring system can follow the final score. The used tools in the present system involves a Hypertext Markup Language (HTML), Visual Basic 6 language and MySQL correlated with oracle and system implementation. Many types of e-exam are considered such as True & False, answer in one word multiple choices, matching between words in two columns and dragging into the screen. The system has been tested successfully based on multiple e-exam modules. The result of this system observed an efficient examination process due to robust generating and managing tests and less human error in the condition of multi-student with multi-lecturer.

Nucleation and Atmospheric Aerosols, 2023
According to the Evaluation of Technology and the Internet, they have been incorporated into all ... more According to the Evaluation of Technology and the Internet, they have been incorporated into all parts of life because of the benefits that make life easier and faster, allowing us to do more difficult activities in a more productive manner. This paper focuses on the design and implementation of a website that locates the closest school for the purpose of verifying its location on Google Maps and displaying a review of the school's essential information, such as (name school, email for the school, phone number, address, and so on) about the school. The system is compatible with any web browser (Google Chrome, Microsoft Edge). Browsers can visit the website from any device, including desktops, tablets, iPads, and mobile phones. And it works with any operating system, including Android, IOS, and Windows. The concept behind the suggestion is to make the search process so simple and quick that it can be utilized by anyone, regardless of their age or level of familiarity with Google Maps. It also involves the administration of schools and their registration in databases, which allows for the retrieval of information about each school as well as the insertion of new information and the alteration of current data.
Uploads
Papers by Yasmin M. Mohialden