State of art for semantic analysis of natural language processing
DH Maulud, SRM Zeebaree, K Jacksi… - Qubahan academic …, 2021 - journal.qubahan.com
Semantic analysis is an essential feature of the NLP approach. It indicates, in the
appropriate format, the context of a sentence or paragraph. Semantics is about language …
appropriate format, the context of a sentence or paragraph. Semantics is about language …
Comparison among cloud technologies and cloud performance
The cloud is the best method used for the utilization and organization of data. The cloud
provides many resources for us via the internet. There are many technologies used in cloud …
provides many resources for us via the internet. There are many technologies used in cloud …
Cloud computing virtualization of resources allocation for distributed systems
Cloud computing is a new technology which managed by a third party “cloud provider” to
provide the clients with services anywhere, at any time, and under various circumstances. In …
provide the clients with services anywhere, at any time, and under various circumstances. In …
Machine learning approaches for combating distributed denial of service attacks in modern networking environments
A Aljuhani - IEEE Access, 2021 - ieeexplore.ieee.org
A distributed denial of service (DDoS) attack represents a major threat to service providers.
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …
[PDF][PDF] Evolution of mobile wireless communication to 5G revolution
AA Salih, SR Zeebaree, AS Abdulraheem… - … Reports of Kansai …, 2020 - researchgate.net
Over recent years, the evolution of mobile wireless communication in the world has become
more important after arrival 5G technology. This evolution journey consists of several …
more important after arrival 5G technology. This evolution journey consists of several …
A comprehensive survey of 5G mm-wave technology design challenges
BT Jijo, SRM Zeebaree… - … of Research in …, 2021 - scholar.researcherseuropeans.com
Physical layer protection, which protects data confidentiality using information-theoretic
methods, has recently attracted a lot of research attention. Using the inherent randomness of …
methods, has recently attracted a lot of research attention. Using the inherent randomness of …
Web phishing detection using web crawling, cloud infrastructure and deep learning framework
The pandemic of COVID-19 obliges citizens to follow the “work from home “scheme. The
Internet is also a powerful channel for social connections. The huge dependency of people …
Internet is also a powerful channel for social connections. The huge dependency of people …
A State of Art: Survey for Concurrent Computation and Clustering of Parallel Computing for Distributed Systems
In this paper, several works have been presented related to clustering parallel computing for
distributed systems. The trend of the paper is to focus on the strengths of previous works in …
distributed systems. The trend of the paper is to focus on the strengths of previous works in …
[PDF][PDF] A comprehensive study of kernel (issues and concepts) in different operating systems
Various operating systems (OS) with numerous functions and features have appeared over
time. As a result, they know how each OS has been implemented guides users' decisions on …
time. As a result, they know how each OS has been implemented guides users' decisions on …
A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection
With the growing internet services, cybersecurity becomes one of the major research
problems of the modern digital era. Cybersecurity involves techniques to protect and control …
problems of the modern digital era. Cybersecurity involves techniques to protect and control …