Kamal H. Jihad

ORCID: 0009-0009-6761-9776
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Misinformation and Its Impacts
  • Big Data and Business Intelligence
  • Service-Oriented Architecture and Web Services
  • Energy, Environment, and Transportation Policies
  • Educational Games and Gamification
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Distributed and Parallel Computing Systems
  • Forecasting Techniques and Applications
  • Air Quality Monitoring and Forecasting
  • Cybercrime and Law Enforcement Studies
  • Scheduling and Optimization Algorithms
  • Energy Load and Power Forecasting
  • Metaheuristic Optimization Algorithms Research
  • Image and Signal Denoising Methods
  • Cloud Computing and Resource Management
  • Electric Vehicles and Infrastructure
  • Topic Modeling
  • Complex Network Analysis Techniques
  • Natural Language Processing Techniques
  • Advanced Data Processing Techniques
  • Innovation Diffusion and Forecasting
  • Image Retrieval and Classification Techniques
  • Blockchain Technology Applications and Security
  • Smart Agriculture and AI

University of Kirkuk
2017-2023

University of Sfax
2023

CPU scheduling algorithms have a significant function in multiprogramming operating systems. When the is effective high rate of computation could be done correctly and also system will maintain stable state. As well as, are main service systems that fulfill maximum utilization CPU. This paper aims to compare characteristics towards which one best algorithm for gaining higher utilization. The comparison has been between ten with presenting different parameters, such as performance,...

10.11591/eei.v10i5.2812 article EN Bulletin of Electrical Engineering and Informatics 2021-10-01

Social media has become an excellent way to discover people’s thoughts about various topics and situations. In recent years, many studies have focused on social during crises, including natural disasters or wars caused by individuals. This study examines how people expressed their feelings Twitter the Russian aggression Ukraine. met two goals: collected data was unique, it used Machine Learning (ML) classify tweets based effect feelings. The first goal find most relevant hashtags locate set....

10.5455/jjcit.71-1676205770 article EN cc-by Jordanian Journal of Computers and Information Technology 2023-01-01

Nowadays processing of the image is an emerging science. The contributed in several research fields such as biomedical, security, education, and space. phenomenon corruption images due to noise a big obstacle. main two reasons for appearing are transmission process from place or it may happen during acquisition process. On other hand, there lot techniques removing retrieving quality by manipulating data. In this article, brief study on major types introduced. Also, consists famous de-noising...

10.17605/osf.io/87xgj article EN ResearchJet Journal of Analysis and Inventions 2021-01-01

Abstract Social media has become an excellent way to discover people's thoughts about various topics and situations. In recent years, many studies have focused on social during crises, including natural disasters or wars caused by individuals. This study looks at how people expressed their feelings Twitter the conflict between Russia Ukraine. met two goals: collected data was unique, it used machine learning (ML) classify tweets based effect feelings. The first goal find most relevant...

10.21203/rs.3.rs-2410016/v1 preprint EN cc-by Research Square (Research Square) 2023-01-03

Neuroevolutionary algorithms, such as NeuroEvolution of Augmenting Topologies (NEAT) in Machine Learning (ML) methods, are utilized for training and playing computer games due to increased research the Artificial Intelligence (AI) field. NEAT is a genetic algorithm generation evolving artificial neural networks. In this paper, new study presented. A Dama board game designed, implemented develop train populations networks efficiently. Different inputs outputs network used, various sizes tried...

10.31449/inf.v46i5.3897 article EN Informatica 2022-03-10

The key target of Distributed Denial-of-Service (DDoS) attacks is to interrupt and suspend any available online services either executed for professional or personal gains. These originate from the fast advancement in number insecure technologies. are caused due easy access internet advent technology resulting exponential growth traffic volumes. DDoS attack remains most leading security risks provisioning services. Also, current embraced mechanism defense lacks flexibility adequate resources...

10.31449/inf.v46i7.4033 article EN Informatica 2022-10-24

This research includes an analytical study of the administrative and scientific work in departments, branchs units Kirkuk University Presidency. It aims to convert traditional routine electronic at university by applying E-Management technique as one required modern logical solutions most commonly used facilitate difficulty managing vast amount documents delaying workflow that facing institutions organizations. In view increasing urgent need for use systems throughout all departments...

10.29304/jqcm.2017.9.2.310 article EN Journal of Al-Qadisiyah for Computer Science and Mathematics 2017-11-19

One of the approaches that fall under alternative application water on earth or soil is electronic irrigation. It aware need to irrigate crops, restore vegetation difficult in arid areas, and because dry spells, as our state has experienced recent years. Other issues, such increasing plant growth while lowering value agriculture, necessitate installing an irrigation system cuts back effort, reduces farm field employees, minimizes monetary matters within construction agricultural comes...

10.21533/pen.v9i4.2500 article EN Periodicals of Engineering and Natural Sciences (PEN) 2021-12-26

The Directorate of Dormitories at the University Kirkuk offers full accommodated rooms to male and female students. However, directorate registers assigns accommodations manually. Therefore, a visiting has been made identify problems this system. It is found that manual system suffers from several issues such as wasting time, losing data extra charges in documenting students' information. Additionally, delays replying students’ enquiries, ignoring their discipline distributing them among...

10.32894/kujss.2018.145716 article EN cc-by Kirkuk University Journal-Scientific Studies 2018-06-01
Coming Soon ...