State of art for semantic analysis of natural language processing

DH Maulud, SRM Zeebaree, K Jacksi… - Qubahan academic …, 2021 - journal.qubahan.com
Semantic analysis is an essential feature of the NLP approach. It indicates, in the
appropriate format, the context of a sentence or paragraph. Semantics is about language …

Comparison among cloud technologies and cloud performance

O Alzakholi, H Shukur, R Zebari, S Abas… - Journal of Applied …, 2020 - jastt.org
The cloud is the best method used for the utilization and organization of data. The cloud
provides many resources for us via the internet. There are many technologies used in cloud …

Cloud computing virtualization of resources allocation for distributed systems

H Shukur, S Zeebaree, R Zebari, D Zeebaree… - Journal of Applied …, 2020 - jastt.org
Cloud computing is a new technology which managed by a third party “cloud provider” to
provide the clients with services anywhere, at any time, and under various circumstances. In …

Machine learning approaches for combating distributed denial of service attacks in modern networking environments

A Aljuhani - IEEE Access, 2021 - ieeexplore.ieee.org
A distributed denial of service (DDoS) attack represents a major threat to service providers.
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …

[PDF][PDF] Evolution of mobile wireless communication to 5G revolution

AA Salih, SR Zeebaree, AS Abdulraheem… - … Reports of Kansai …, 2020 - researchgate.net
Over recent years, the evolution of mobile wireless communication in the world has become
more important after arrival 5G technology. This evolution journey consists of several …

A comprehensive survey of 5G mm-wave technology design challenges

BT Jijo, SRM Zeebaree… - … of Research in …, 2021 - scholar.researcherseuropeans.com
Physical layer protection, which protects data confidentiality using information-theoretic
methods, has recently attracted a lot of research attention. Using the inherent randomness of …

Web phishing detection using web crawling, cloud infrastructure and deep learning framework

LM Abdulrahman, SH Ahmed, ZN Rashid… - Journal of Applied …, 2023 - jastt.org
The pandemic of COVID-19 obliges citizens to follow the “work from home “scheme. The
Internet is also a powerful channel for social connections. The huge dependency of people …

A State of Art: Survey for Concurrent Computation and Clustering of Parallel Computing for Distributed Systems

H Shukur, SRM Zeebaree, AJ Ahmed, RR Zebari… - Journal of Applied …, 2020 - jastt.org
In this paper, several works have been presented related to clustering parallel computing for
distributed systems. The trend of the paper is to focus on the strengths of previous works in …

[PDF][PDF] A comprehensive study of kernel (issues and concepts) in different operating systems

H Malallah, SR Zeebaree, RR Zebari… - Asian Journal of …, 2021 - academia.edu
Various operating systems (OS) with numerous functions and features have appeared over
time. As a result, they know how each OS has been implemented guides users' decisions on …

A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection

A Salih, ST Zeebaree, S Ameen… - … & Innovation amid …, 2021 - ieeexplore.ieee.org
With the growing internet services, cybersecurity becomes one of the major research
problems of the modern digital era. Cybersecurity involves techniques to protect and control …