Muayad Sadik Croock
University of Technology

Published : 14 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Dominated destinations of tourist inside Iraq using personal information and frequency of travel Rula Amjed; Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.11956

Abstract

Tourism today is one of the most important economic and social sectors in the world, which plays a prominent role in the development of countries. This importance has grown as an industry through the social media networks.In this paper, a proposed method has been introduced distinguish the main factors that impact the Frequency of Travel (FoT) among Iraq local tourists. Application (API) graphics and scrapy are utilized to collect information from TripAdvisor social network in a period of (2015-2018). The collected information are reprocessed and coded for the specified nominal data using tied rank. It is important to note that the adopted technique does not lose any data about the attribute and brings different properties beforehand obscure. Data mining ordinal logistic regression is used to extract user's behavior upon local tourism in Iraq. The expected outcome of this work is to discover out the effect of personal information and the type of places on the selection of the local touristic places in Iraq. The collected information was exploited to know the preferred local touristic trends, because there are no statistics on the number of domestic tourists in Iraq. The proposed model was used for analyzing personal information and types of preferred tourism places as a factors affecting frequency of travel in Iraq. The obtained results show the prediction of preferred touristic places by tourists in Iraq.
Viterbi optimization for crime detection and identification Reem Razzaq Abdul Hussain; Salih Mahdi Al-Qaraawi; Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.13398

Abstract

In this paper, we introduce two types of hybridization. The first contribution is the hybridization between the Viterbi algorithm and Baum Welch in order to predict crime locations. While the second contribution considers the optimization based on decision tree (DT) in combination with the Viterbi algorithm for criminal identification using Iraq and India crime dataset. This work is based on our previous work [1]. The main goal is to enhance the results of the model in both consuming times and to get a more accurate model. The obtained results proved the achievement of both goals in an efficient way.
Physical cyber-security algorithm for wireless sensor networks Dhuha Dheyaa Khudhur; Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18464

Abstract

Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it is used in many applications such as military, medical, greenhouse, and transport. Due to the sending data between its nodes or to the base station requires a connection link, the sensor nodes can be exposed to the many attacks that exploit the weaknesses of the network. One of the most important types of these attacks is the denial of service (DoS). DoS attack exhausts the system's resources that lead the system to be out of service. In this paper, a cyber-security algorithm is proposed for physical level of WSN that adopts message queuing telemetry transport (MQTT) protocol for data transmission and networking. This algorithm predicts the DoS attacks at the first time of happening to be isolated from the WSN. It includes three stages of detecting the attack, predicting the effects of this attack and preventing the attacks by excluding the predicted nodes from the WSN. We applied a type of DoS attack that is a DoS injection attack (DoSIA) on the network protocol. The proposed algorithm is tested by adopting three case studies to cover the most common cases of attacks. The experiment results show the superior of the proposed algorithm in detecting and solving the cyber-attacks.
Mobile learning architecture using fog computing and adaptive data streaming Shymaa Mohammed Jameel; Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.16712

Abstract

With the huge development in mobile and network fields, sensor technologies and fog computing help the students for more effective learning, flexible and in and effective manner from anywhere. Using the mobile device for learn encourage the transition to mobile computing (cloud and fog computing) which is led to the ability to design customized system that help student to learn via context aware learning which can be done by set the user preference and use proper methods to show only related manner subject. The presented study works on developing a system of e-learning which has been on the basis of fog computing concepts with deep learning approaches utilized for classification to the data content for accomplishing the context aware learning and use the adaptation of video quality using special equation and the data encrypted and decrypted using 3DES algorithm to ensure the security side of the operation.