- Cloud Data Security Solutions
- Artificial Intelligence in Healthcare and Education
- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Biometric Identification and Security
- Chaos-based Image/Signal Encryption
- Brain Tumor Detection and Classification
- Explainable Artificial Intelligence (XAI)
- Cloud Computing and Resource Management
- Artificial Intelligence in Healthcare
- Forensic Anthropology and Bioarchaeology Studies
- IoT and Edge/Fog Computing
- Second Language Learning and Teaching
- Embedded Systems Design Techniques
- Software Engineering Research
- COVID-19 diagnosis using AI
- EFL/ESL Teaching and Learning
- Advanced Malware Detection Techniques
- Face recognition and analysis
- Software Testing and Debugging Techniques
- AI in cancer detection
- Handwritten Text Recognition Techniques
- Authorship Attribution and Profiling
- Machine Learning in Healthcare
- Natural Language Processing Techniques
Kurdistan Regional Government
2019-2025
University of Garmian
2019-2024
University of Sulaimani
2019-2024
This research paper explores the use of Chat GPT in solving programming bugs. The examines characteristics and how they can be leveraged to provide debugging assistance, bug prediction, explanation help solve problems. also limitations bugs importance using other tools techniques validate its predictions explanations. concludes by highlighting potential as one part a comprehensive toolkit, benefits combining strengths with identify fix more effectively.
In the rapidly evolving realm of cloud computing security, this paper introduces an innovative solution to address persistent challenges. The proliferation technology has brought forth heightened concerns regarding data necessitating novel approaches safeguarding sensitive information. issue centers on vulnerability cloud-stored data, often enhanced encryption and key management strategies. Traditional methods fall short in mitigating risks associated with compromised keys centralized...
The integration of artificial intelligence into the realm education has emerged as a consequence using information and communication technologies effective instruments to enhance process teaching learning. In November 2022, an AI-driven chatbot known ChatGPT was introduced. This possesses capability produce coherent informative responses akin those generated by humans in response user inputs. demonstrates its adaptability potential facilitator open providing assistance, guidance, feedback...
This comprehensive study investigates the integration of cloud computing and deep learning technologies in medical data analysis, focusing on their combined effects healthcare delivery patient outcomes. Through a methodical examination implementation instances at various facilities, we investigate how well these manage variety sources, such as wearable device data, imaging electronic health records (EHRs). Our research demonstrates significant improvements diagnostic accuracy (15–20% average...
This article presents two massive datasets for central Kurdish handwriting digits and isolated characters named K-ZHMARA K-PIT. The first dataset, contains 70,000 images of digits, 7000 each digit, a printed A4 paper with grid 10 × is used data collection. Apart from the K-PIT dataset includes 245,000 all characters, character; was collected via 12 this dataset. Moreover, both include 315,000 images. Python programming has been to scan piece paper, segment, crop, resize, binarize, invert...
Recent technologies like the internet, coupled with software applications, have lately assisted to enrich our contemporary lives. Consequently, countless educational institutions can see benefit of embracing these apps attain edge over. Cloud computing is taking center stage in academia due its abundant benefits. It a growing technology that enables conventional IT systems be modified. Dissimilar learning apply various cloud-based services offered by service providers guarantee their...
During the COVID-19 pandemic, increasing amount of personal and sensitive data collected in healthcare inistiutions, make it necessary to use cloud not only store data, but also process cloud. Obviously, most people would like get a secure information related their health. Therefore, with recent growth computing privacy protection requirements have been evolving toto protect individuals from surveillance leakage. However, due security concerns about frequent breaches recently upgraded legal...
A trustworthy and secure identity verification system is in great demand nowadays. The automatic recognition of the 3D middle finger knuckle a new biometric identifier that could offer precise, practical, efficient alternative for personal identification. According to earlier studies, deep learning algorithms be used However, accuracy current model relatively low. Motivated by this fact, study, seven neural networks have been modified trained identify patterns using transfer learning. Using...
The global spread of Covid-19 has enhanced the adoption virtual education and use technology in order to reduce risk contagion. Recently, academics have turn out be more technology-orientated educational establishments continue seek opportunities adopt an environment where all researchers could access high-quality scientific resources at anytime anywhere world. Cloud computing is a model, which provides users with services application software on-demand, using Internet. While cloud...
Artificial Intelligence (AI), a rapidly advancing field in the modern era, particularly within computer science, continues to progress by developing tools with superior capabilities and innovative features. This study aims conduct comparative analysis between ChatGPT-4 its enhanced version, ChatGPT-4o, based on various parameters. The methodology employs mixed-methods approach using standardized dataset systematically designed prompts. findings reveal significant improvements, including...
A cloud computing environment provides a cost-effective way for end-users to remotely store and retrieve private data through an internet connection anytime anywhere. The security of these cannot always be guaranteed because they can only accessed by the end-user third-party interface, making them vulnerable potential breaches authentication integrity. This paper presents secure hybrid approach medical image stored in that prioritizes suggested model employs combination Elliptic Curve...
Cloud computing has emerged as a new technology model for providing customized, high quality and reliable services clients over the Internet. These can rent long they need rather than owning maintaining large expensive IT infrastructure. One of most used cloud is storage it provides on demand service. Nevertheless, due to structure which may not fully be managed by clients, privacy security become significant challenge. Most previous works trying solve challenges with data encryption...
An operating system is software that designed to manage computer hardware and resources. However, this management requires applying an ample number of techniques algorithms which are called synchronization scheduling. The scheduling used arrange the way CPU assigned processes, while utilized indicate how work with multi-processes at same time. Therefore, they related each other. a vital phenomenon system. At present, numerous exist as First Come Serve) FCFS(, Shortest Job (SJF), Remaining...