Dr. Shavan Askar (Associate Professor of Computer Networks) is currently CEO at Arcella Telecom. He received his PhD degree in Electronic Systems Engineering from the University of Essex\UK in 2012. He obtained his MSc (2003) and BSc (2001, Ranked 1st on the college) degrees from the Control and Systems Engineering Dept. Baghdad. Dr. Askar works in the field of Networks that includes Internet of Things, Software Defined Networks, Optical Networks, and 5G. Dr. Askar has started his academic career in 2003 when he was appointed as a lecturer at the University of Duhok Iraq until 2008 when he was granted a scholarship to do his PhD degree that commenced in October 2008 and finished successfully in June 2012. Dr. Askar then returned to Iraq to pursue his academic career at the University of Duhok for the period 2012-2016 by supervising master students, teaching post-gradatue courses, and became project manager of so many strategic projects in Kurdistan. In 2016, Dr. Askar joined Duhok Polytechnic University as the Director General of Scientific Research Center, his role includes apart from teaching post-graduate students, contributing to the development of the university from the technological and scientific perspectives. Since 2017, Dr. Askar beside his DPU job is working as an Adjunct Professor at the American University of Kurdistan, he contributed into the establishment of a new program called Electronic and Telecommunications Engineering\College of Engineering, he teaches different courses in this program. Dr. Askar has more than 60 scientific research papers, some of his papers were published in very prestigious conferences such as OFC and ECOC and high impact factor (3.58) journals such as Optics Express. While he was in UK, he worked as a Researcher in two European projects
Child drawing development optimization (CDDO) is a recent example of a metaheuristic algorithm. T... more Child drawing development optimization (CDDO) is a recent example of a metaheuristic algorithm. The motive for inventing this method is children’s learning behavior and cognitive development, with the golden ratio being employed to optimize the aesthetic value of their artwork. Unfortunately, CDDO suffers from low performance in the exploration phase, and the local best solution stagnates. Harmony search (HS) is a highly competitive algorithm relative to other prevalent metaheuristic algorithms, as its exploration phase performance on unimodal benchmark functions is outstanding. Thus, to avoid these issues, we present CDDO–HS, a hybridization of both standards of CDDO and HS. The hybridized model proposed consists of two phases. Initially, the pattern size (PS) is relocated to the algorithm’s core and the initial pattern size is set to 80% of the total population size. Second, the standard harmony search (HS) is added to the pattern size (PS) for the exploration phase to enhance and...
Due to advancement in internet of medical things, the conventional health-care systems are transf... more Due to advancement in internet of medical things, the conventional health-care systems are transformed into smart health-care systems. The medical emergence services can be significantly enhanced by integration of IoMT and data analytic techniques. These technologies also examine the unexplored area of medical services that are still unseen and provide opportunity for investigation. Moreover, the concept of smart cities is not achievable without providing a smart connected healthcare scheme. Hence, the main purpose of this research is to come up with a smart healthcare system based on IoMT, Cloud and Fog computing and intelligent data analytic technique. The major objective of the proposed healthcare system is to develop a diagnostic model capable for earlier treatment of heart disease. The suggested scheme consists of distinct phases such as data acquisition, feature extraction, FogBus based edge/fog computing environment, classification, and evaluation. In data acquisition, differ...
JAREE (Journal on Advanced Research in Electrical Engineering)
Metaheuristic algorithms are computational intelligence paradigms especially used for solving dif... more Metaheuristic algorithms are computational intelligence paradigms especially used for solving different optimization issues. Metaheuristics examine a collection of solutions otherwise really be wide to be thoroughly addressed or discussed in any other way. Metaheuristics can be applied to a wide range of problems because they make accurate predictions in any optimization situation. Natural processes such as the fact of evolution in Natural selection behavioral genetics, ant behaviors in genetics, swarm behaviors of certain animals, annealing in metallurgy, and others motivate metaheuristics algorithms. The big cluster search algorithm is by far the most commonly used metaheuristic algorithm. The principle behind this algorithm is that it begins with an optimal state and then uses heuristic methods from the community search algorithm to try to refine it. Many metaheuristic algorithms in diverse environments and areas are examined, compared, and described in this article. Such as Gen...
Flooding is one of the most prevalent types of natural catastrophes, and it can cause extensive d... more Flooding is one of the most prevalent types of natural catastrophes, and it can cause extensive damage to infrastructure and the natural environment. The primary method of flood risk management is flood susceptibility mapping (FSM), which provides a quantitative assessment of a region’s vulnerability to flooding. The objective of this study is to develop new ensemble models for FSM by integrating metaheuristic algorithms, such as genetic algorithms (GA), particle swarm optimization (PSO), and harmony search (HS), with the decision table classifier (DTB). The proposed algorithms were applied in the province of Sulaymaniyah, Iraq. Sentinel-1 synthetic aperture radar (SAR) data satellite images were used for flood monitoring (on 27 July 2019), and 160 flood occurrence locations were prepared for modeling. For the training and validation datasets, flood occurrence data were coupled to 1 flood-influencing parameters (slope, altitude, aspect, plan curvature, distance from rivers, land cov...
In this letter, we investigate the electron injection rate-based optical bistability (OB) and opt... more In this letter, we investigate the electron injection rate-based optical bistability (OB) and optical multistability (OM) features in an imperfect cavity. Coherent optical fields interact with the open four-level quantum system that makes up the ring cavity. We have discovered that the threshold of OB and OM as well as the length of the hysteresis loop can be changed by varying the length of the quantum system, reflection and transmission coefficient of cavity mirrors. Our findings further show that the electronic exit rate from the cavity and the electron injection rates have a significant impact on the threshold of OB and OM. It is discovered that transitioning from OB to OM or vice versa is achievable by adjusting the controllable parameters. The impact of the cooperation parameter on the properties of the OB and OM is then addressed. The findings demonstrate that the OB features are simple to manipulate. Our suggested model might be used to develop an all-optical device for use ...
IAES International Journal of Artificial Intelligence (IJ-AI)
Automated flaw identification has become more important in medical imaging. For patient preparati... more Automated flaw identification has become more important in medical imaging. For patient preparation, unaided prediction of tumor (brain) detection in the magnetic resonance imaging process (MRI) is critical. Traditional ways of recognizing z are intended to make radiologists' jobs easier. The size and variety of molecular structures in brain tumors is one of the issues with MRI brain tumor diagnosis. Deep learning (DL) techniques (artificial neural network (ANN), naive Bayes (NB), multi-layer perceptron (MLP)) are used in this article to detect brain cancers in MRI data. The preprocessing techniques are used to eliminate textural features from the brain MRI images. These characteristics are then utilized to train a machine-learning system.
In medical imaging, automated defect identification of defects has taken on a prominent position.... more In medical imaging, automated defect identification of defects has taken on a prominent position. Unaided prediction of tumor (brain) recognition in magnetic resonance imaging process (MRI) is vital for patient preparation. With traditional methods of identifying z is designed to reduce the burden on radiologists. One of the problems with MRI brain tumor diagnosis is the size and variation of their molecular structures. This article uses deep learning techniques (Artificial neural network ANN, Naive Bayes NB, Multi-layer Perceptron MLP ) to discover brain tumors in the MRI scans. First, the brain MRI images are run through the preprocessing steps to remove texture features. Next, these features are used to train a machine learning algorithm
A basic blockchain system is characterized as the ordered list for the used nodes and links where... more A basic blockchain system is characterized as the ordered list for the used nodes and links where these nodes are entitled for storing information and chains connect these links. This technology mainly facilitates the development and management of the availability for the publicly available and required resources and ledger of transactions. This technology also supports the development of the cryptocurrency-based operation and performance evaluation for the technological management. This paper has analyzed different components of Blockchain concepts and evaluated the potential development, structural components, risks, applications within the present-day technological world.
The expansion of the internet, along with its interconnection of devices has made it possible to ... more The expansion of the internet, along with its interconnection of devices has made it possible to increase the world's interconnectedness in these days, with the growth in internet connectivity capabilities and quality, a lot of items are interconnected, which means they communicate with each other using new and powerful techniques. Innovative sensor systems are spreading their consumers are strongly connected to the internet. The growth of linked sensors and systems has an incremental impact on the quantity of data. Regardless of its purpose, it is accumulating whole data. The Internet of Things (IoT) has a practical use for industries such as obtaining field data, tracking it and keeping them, all connected. To imitate the human intelligence level, the machine or software is made smarter by using advanced deep learning. In the paper, several diverse types of IoT technologies will be referenced, including intelligent cities, smart health care, mobility networks, and educational ...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain an... more Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and other DLTs has dramatically advanced in recent years, and is being recommended for various applications. In blockchain, these capabilities are supplied by means of hash functions and public-key encryption. However, the rapid development of quantum computation in the near future has opened the door to the Grover and Shor algorithms. These algorithms challenge both public and hash encryption, causing blockchains to redesign and use quantum attack-tolerant cryptosystems; this produces cryptosystems which are considered post-quantum cryptosystems, which are quantum-resistant. This paper reviews current scientists on quantum blockchain for such purposes. In addition, the major challenges are studied with the most important post-quantum blockchain systems. In addition, the most promising post quantum signature encryption and digital blockchain signature schemes are detailed in terms of the f...
With the coming of fast advancements, with the assistance of IoT, a great percentage of heterogen... more With the coming of fast advancements, with the assistance of IoT, a great percentage of heterogeneous devices can be connected with each other. The technology with the relationship of different devices through the internet is named the internet of things (IoT), makes a wide number of different characteristics and qualities of data. IoT and Machine learning (ML) guarantees the widespread advancement to grow the insights of the IoT devices and applications. Over the final few years, artificial intelligence and machine learning have advanced very significantly. It allows a machine or system to learn more effectively than people learn on their own. When we learn some kind of system about the concept of our trial or the knowledge obtained after evaluating it. Combining IoT with rapidly advancing ML technologies can make 'smart machines' that mimic smart action to do well-informed resolve with little or no human involvement. There are at least two fundamental reasons, why machine ...
As the number of cars is growing, there is also a rapid growth in the number of road side acciden... more As the number of cars is growing, there is also a rapid growth in the number of road side accident. Much of these incidents have occurred by an error made by a driver. New protocols and architecture are rapidly being created for intelligent transport networks by researchers all over the world. To guarantee passengers' safety, several companies are now encouraging an ad hoc vehicular network (VANET). In another side, before practically adopting VANET technology, there are many concerns related to this field that need to be discussed. A number of attacks can occur in the event of no or weak protection, which can be affected by the performance and reliability of the process. In order to make VANET networks more successful, it implements software defined networking (SDN) technology. This technique was briefly called SDN-VANET. The SDN in VANET framework enables us to prevent from the limitations and complexities of basic VANET structures. Through handling the whole network from a si...
The IoT systems and connectivity provide improved experience and improve the quality of service f... more The IoT systems and connectivity provide improved experience and improve the quality of service for the users in different perspectives. Recent development of the technological prospects and management of the sufficient aspects for the delivery of performance need to be ensured in this regard. The concept of IoT is related with the widely connected features, systems, data storage facilities, management processes, applications, devices, users, gateways, services and thousands of other elements. As the importance of IoT applications has been growing in recent times, the prospects for development and management are immense for the development opportunities. In recent times, cybersecurity and ensuring privacy for the users have attracted attention of the users. With growing popularity of the social media platforms, more and more people are becoming connected. With growing opportunity of connectivity, people need more secured space to connect. In this article, different aspects of the cy...
Blockchain technology has lately become widely regarded, partially because of the surge in crypto... more Blockchain technology has lately become widely regarded, partially because of the surge in cryptocurrencies such as Bitcoin and their ability to be a force for economic and financial shift. While tokenomics also helped push blockchain in mainstream, this technology's strengths are far more than crypt-monetary. Often known as distributed leader technologies, it is hypothesized that blockchain would serve like a catalyst for global disruptions and that blockchain-based applications in many industries such as the supply chain; the medical and legal fields are now being developed and implemented. By simultaneous research, we prove that the six confirms convention is vulnerable to peer-to-peer latency in the network and show just how readily PoW mining is broken. The divergences between these latest blocks open the transactions in question to the possibility that the blockchain fork will not be used. We concentrate on evaluating block detection accuracy and the breach of the six conf...
Fog computing (FC) is a new architecture that aims to reduce network pressures throughout the cor... more Fog computing (FC) is a new architecture that aims to reduce network pressures throughout the core network as well as the cloud computing (CC) by bringing resource-intensive functions like computation, analytics, connectivity, also storage, nearest to the clients. In their operations, FC systems can make use of intelligence features to reap the benefits of data that is readily accessible with computing resources to be able to resolve the problem of excessive energy use with power for Internet-of-Things (IoT) apps that require speed. It generates large volumes of data, prompting the creation of a growing number of FC apps and services. Furthermore, Deep Learning (DL), an important field, has made significant progress in a variety of research areas, including robotics, face recognition, neuromorphic computing, decision-making, computer graphics, and speech recognition. Several studies have been suggested to look at how to use DL to solve FC issues. DL has become more common these days...
The contexts of SDN or Software Defined Network deliver increased level of programmable and funct... more The contexts of SDN or Software Defined Network deliver increased level of programmable and functionality within the network development, network configuration and development of the dynamic management in the software protocol. SDN concept also provides centralized management and development approach for the network selection, network control and data plans. In this paper, different deep learning models and technical processes for the SDN networks have been reviewed.
The unprecedented growth in internet applications' requirement makes adopting smart network a... more The unprecedented growth in internet applications' requirement makes adopting smart network architectures such as Software Defined Networking inevitable. Software-Defined Networking (SDN) is a new network architecture that separates the tight coupling between the control plane and the data plane that exists in traditional networks. The purpose of this separation is to enhance the controllability, security, and management of network resources. A controller is the core element of any SDN network, since SDN use as an alternative of traditional networks, different controllers have been developed, such as Beacon, Floodlight, RYU, OpenDay Light, ONOS, NOX, and POX. Due to the diversity of SDN applications and the use of controllers, the choice of the best-fitted controller has become an application-dependent process, therefore, this study evaluates different SDN controllers in trem of their effect on the SDN QoS performance. A comparison between the POX and RYU, which are widely used ...
International Journal of Interactive Mobile Technologies (iJIM), 2021
Internet of Things (IoT) systems usually produce massive amounts of data, while the number of dev... more Internet of Things (IoT) systems usually produce massive amounts of data, while the number of devices connected to the internet might reach billions by now. Sending all this data over the internet will overhead the cloud and consume bandwidth. Fog computing's (FC) promising technology can solve the issue of computing and networking bottlenecks in large-scale IoT applications. This technology complements the cloud computing by providing processing power and storage to the edge of the network. However, it still suffers from performance and security issues. Thus, machine learning (ML) attracts attention for enabling FC to settle its issues. Lately, there has been a growing trend in utilizing ML to improve FC applications, like resource management, security, lessen latency and power usage. Also, intelligent FC was studied to address issues in industry 4.0, bioinformatics, blockchain and vehicular communication system. Due to the ML vital role in the FC paradigm, this work will shed ...
Child drawing development optimization (CDDO) is a recent example of a metaheuristic algorithm. T... more Child drawing development optimization (CDDO) is a recent example of a metaheuristic algorithm. The motive for inventing this method is children’s learning behavior and cognitive development, with the golden ratio being employed to optimize the aesthetic value of their artwork. Unfortunately, CDDO suffers from low performance in the exploration phase, and the local best solution stagnates. Harmony search (HS) is a highly competitive algorithm relative to other prevalent metaheuristic algorithms, as its exploration phase performance on unimodal benchmark functions is outstanding. Thus, to avoid these issues, we present CDDO–HS, a hybridization of both standards of CDDO and HS. The hybridized model proposed consists of two phases. Initially, the pattern size (PS) is relocated to the algorithm’s core and the initial pattern size is set to 80% of the total population size. Second, the standard harmony search (HS) is added to the pattern size (PS) for the exploration phase to enhance and...
Due to advancement in internet of medical things, the conventional health-care systems are transf... more Due to advancement in internet of medical things, the conventional health-care systems are transformed into smart health-care systems. The medical emergence services can be significantly enhanced by integration of IoMT and data analytic techniques. These technologies also examine the unexplored area of medical services that are still unseen and provide opportunity for investigation. Moreover, the concept of smart cities is not achievable without providing a smart connected healthcare scheme. Hence, the main purpose of this research is to come up with a smart healthcare system based on IoMT, Cloud and Fog computing and intelligent data analytic technique. The major objective of the proposed healthcare system is to develop a diagnostic model capable for earlier treatment of heart disease. The suggested scheme consists of distinct phases such as data acquisition, feature extraction, FogBus based edge/fog computing environment, classification, and evaluation. In data acquisition, differ...
JAREE (Journal on Advanced Research in Electrical Engineering)
Metaheuristic algorithms are computational intelligence paradigms especially used for solving dif... more Metaheuristic algorithms are computational intelligence paradigms especially used for solving different optimization issues. Metaheuristics examine a collection of solutions otherwise really be wide to be thoroughly addressed or discussed in any other way. Metaheuristics can be applied to a wide range of problems because they make accurate predictions in any optimization situation. Natural processes such as the fact of evolution in Natural selection behavioral genetics, ant behaviors in genetics, swarm behaviors of certain animals, annealing in metallurgy, and others motivate metaheuristics algorithms. The big cluster search algorithm is by far the most commonly used metaheuristic algorithm. The principle behind this algorithm is that it begins with an optimal state and then uses heuristic methods from the community search algorithm to try to refine it. Many metaheuristic algorithms in diverse environments and areas are examined, compared, and described in this article. Such as Gen...
Flooding is one of the most prevalent types of natural catastrophes, and it can cause extensive d... more Flooding is one of the most prevalent types of natural catastrophes, and it can cause extensive damage to infrastructure and the natural environment. The primary method of flood risk management is flood susceptibility mapping (FSM), which provides a quantitative assessment of a region’s vulnerability to flooding. The objective of this study is to develop new ensemble models for FSM by integrating metaheuristic algorithms, such as genetic algorithms (GA), particle swarm optimization (PSO), and harmony search (HS), with the decision table classifier (DTB). The proposed algorithms were applied in the province of Sulaymaniyah, Iraq. Sentinel-1 synthetic aperture radar (SAR) data satellite images were used for flood monitoring (on 27 July 2019), and 160 flood occurrence locations were prepared for modeling. For the training and validation datasets, flood occurrence data were coupled to 1 flood-influencing parameters (slope, altitude, aspect, plan curvature, distance from rivers, land cov...
In this letter, we investigate the electron injection rate-based optical bistability (OB) and opt... more In this letter, we investigate the electron injection rate-based optical bistability (OB) and optical multistability (OM) features in an imperfect cavity. Coherent optical fields interact with the open four-level quantum system that makes up the ring cavity. We have discovered that the threshold of OB and OM as well as the length of the hysteresis loop can be changed by varying the length of the quantum system, reflection and transmission coefficient of cavity mirrors. Our findings further show that the electronic exit rate from the cavity and the electron injection rates have a significant impact on the threshold of OB and OM. It is discovered that transitioning from OB to OM or vice versa is achievable by adjusting the controllable parameters. The impact of the cooperation parameter on the properties of the OB and OM is then addressed. The findings demonstrate that the OB features are simple to manipulate. Our suggested model might be used to develop an all-optical device for use ...
IAES International Journal of Artificial Intelligence (IJ-AI)
Automated flaw identification has become more important in medical imaging. For patient preparati... more Automated flaw identification has become more important in medical imaging. For patient preparation, unaided prediction of tumor (brain) detection in the magnetic resonance imaging process (MRI) is critical. Traditional ways of recognizing z are intended to make radiologists' jobs easier. The size and variety of molecular structures in brain tumors is one of the issues with MRI brain tumor diagnosis. Deep learning (DL) techniques (artificial neural network (ANN), naive Bayes (NB), multi-layer perceptron (MLP)) are used in this article to detect brain cancers in MRI data. The preprocessing techniques are used to eliminate textural features from the brain MRI images. These characteristics are then utilized to train a machine-learning system.
In medical imaging, automated defect identification of defects has taken on a prominent position.... more In medical imaging, automated defect identification of defects has taken on a prominent position. Unaided prediction of tumor (brain) recognition in magnetic resonance imaging process (MRI) is vital for patient preparation. With traditional methods of identifying z is designed to reduce the burden on radiologists. One of the problems with MRI brain tumor diagnosis is the size and variation of their molecular structures. This article uses deep learning techniques (Artificial neural network ANN, Naive Bayes NB, Multi-layer Perceptron MLP ) to discover brain tumors in the MRI scans. First, the brain MRI images are run through the preprocessing steps to remove texture features. Next, these features are used to train a machine learning algorithm
A basic blockchain system is characterized as the ordered list for the used nodes and links where... more A basic blockchain system is characterized as the ordered list for the used nodes and links where these nodes are entitled for storing information and chains connect these links. This technology mainly facilitates the development and management of the availability for the publicly available and required resources and ledger of transactions. This technology also supports the development of the cryptocurrency-based operation and performance evaluation for the technological management. This paper has analyzed different components of Blockchain concepts and evaluated the potential development, structural components, risks, applications within the present-day technological world.
The expansion of the internet, along with its interconnection of devices has made it possible to ... more The expansion of the internet, along with its interconnection of devices has made it possible to increase the world's interconnectedness in these days, with the growth in internet connectivity capabilities and quality, a lot of items are interconnected, which means they communicate with each other using new and powerful techniques. Innovative sensor systems are spreading their consumers are strongly connected to the internet. The growth of linked sensors and systems has an incremental impact on the quantity of data. Regardless of its purpose, it is accumulating whole data. The Internet of Things (IoT) has a practical use for industries such as obtaining field data, tracking it and keeping them, all connected. To imitate the human intelligence level, the machine or software is made smarter by using advanced deep learning. In the paper, several diverse types of IoT technologies will be referenced, including intelligent cities, smart health care, mobility networks, and educational ...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain an... more Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and other DLTs has dramatically advanced in recent years, and is being recommended for various applications. In blockchain, these capabilities are supplied by means of hash functions and public-key encryption. However, the rapid development of quantum computation in the near future has opened the door to the Grover and Shor algorithms. These algorithms challenge both public and hash encryption, causing blockchains to redesign and use quantum attack-tolerant cryptosystems; this produces cryptosystems which are considered post-quantum cryptosystems, which are quantum-resistant. This paper reviews current scientists on quantum blockchain for such purposes. In addition, the major challenges are studied with the most important post-quantum blockchain systems. In addition, the most promising post quantum signature encryption and digital blockchain signature schemes are detailed in terms of the f...
With the coming of fast advancements, with the assistance of IoT, a great percentage of heterogen... more With the coming of fast advancements, with the assistance of IoT, a great percentage of heterogeneous devices can be connected with each other. The technology with the relationship of different devices through the internet is named the internet of things (IoT), makes a wide number of different characteristics and qualities of data. IoT and Machine learning (ML) guarantees the widespread advancement to grow the insights of the IoT devices and applications. Over the final few years, artificial intelligence and machine learning have advanced very significantly. It allows a machine or system to learn more effectively than people learn on their own. When we learn some kind of system about the concept of our trial or the knowledge obtained after evaluating it. Combining IoT with rapidly advancing ML technologies can make 'smart machines' that mimic smart action to do well-informed resolve with little or no human involvement. There are at least two fundamental reasons, why machine ...
As the number of cars is growing, there is also a rapid growth in the number of road side acciden... more As the number of cars is growing, there is also a rapid growth in the number of road side accident. Much of these incidents have occurred by an error made by a driver. New protocols and architecture are rapidly being created for intelligent transport networks by researchers all over the world. To guarantee passengers' safety, several companies are now encouraging an ad hoc vehicular network (VANET). In another side, before practically adopting VANET technology, there are many concerns related to this field that need to be discussed. A number of attacks can occur in the event of no or weak protection, which can be affected by the performance and reliability of the process. In order to make VANET networks more successful, it implements software defined networking (SDN) technology. This technique was briefly called SDN-VANET. The SDN in VANET framework enables us to prevent from the limitations and complexities of basic VANET structures. Through handling the whole network from a si...
The IoT systems and connectivity provide improved experience and improve the quality of service f... more The IoT systems and connectivity provide improved experience and improve the quality of service for the users in different perspectives. Recent development of the technological prospects and management of the sufficient aspects for the delivery of performance need to be ensured in this regard. The concept of IoT is related with the widely connected features, systems, data storage facilities, management processes, applications, devices, users, gateways, services and thousands of other elements. As the importance of IoT applications has been growing in recent times, the prospects for development and management are immense for the development opportunities. In recent times, cybersecurity and ensuring privacy for the users have attracted attention of the users. With growing popularity of the social media platforms, more and more people are becoming connected. With growing opportunity of connectivity, people need more secured space to connect. In this article, different aspects of the cy...
Blockchain technology has lately become widely regarded, partially because of the surge in crypto... more Blockchain technology has lately become widely regarded, partially because of the surge in cryptocurrencies such as Bitcoin and their ability to be a force for economic and financial shift. While tokenomics also helped push blockchain in mainstream, this technology's strengths are far more than crypt-monetary. Often known as distributed leader technologies, it is hypothesized that blockchain would serve like a catalyst for global disruptions and that blockchain-based applications in many industries such as the supply chain; the medical and legal fields are now being developed and implemented. By simultaneous research, we prove that the six confirms convention is vulnerable to peer-to-peer latency in the network and show just how readily PoW mining is broken. The divergences between these latest blocks open the transactions in question to the possibility that the blockchain fork will not be used. We concentrate on evaluating block detection accuracy and the breach of the six conf...
Fog computing (FC) is a new architecture that aims to reduce network pressures throughout the cor... more Fog computing (FC) is a new architecture that aims to reduce network pressures throughout the core network as well as the cloud computing (CC) by bringing resource-intensive functions like computation, analytics, connectivity, also storage, nearest to the clients. In their operations, FC systems can make use of intelligence features to reap the benefits of data that is readily accessible with computing resources to be able to resolve the problem of excessive energy use with power for Internet-of-Things (IoT) apps that require speed. It generates large volumes of data, prompting the creation of a growing number of FC apps and services. Furthermore, Deep Learning (DL), an important field, has made significant progress in a variety of research areas, including robotics, face recognition, neuromorphic computing, decision-making, computer graphics, and speech recognition. Several studies have been suggested to look at how to use DL to solve FC issues. DL has become more common these days...
The contexts of SDN or Software Defined Network deliver increased level of programmable and funct... more The contexts of SDN or Software Defined Network deliver increased level of programmable and functionality within the network development, network configuration and development of the dynamic management in the software protocol. SDN concept also provides centralized management and development approach for the network selection, network control and data plans. In this paper, different deep learning models and technical processes for the SDN networks have been reviewed.
The unprecedented growth in internet applications' requirement makes adopting smart network a... more The unprecedented growth in internet applications' requirement makes adopting smart network architectures such as Software Defined Networking inevitable. Software-Defined Networking (SDN) is a new network architecture that separates the tight coupling between the control plane and the data plane that exists in traditional networks. The purpose of this separation is to enhance the controllability, security, and management of network resources. A controller is the core element of any SDN network, since SDN use as an alternative of traditional networks, different controllers have been developed, such as Beacon, Floodlight, RYU, OpenDay Light, ONOS, NOX, and POX. Due to the diversity of SDN applications and the use of controllers, the choice of the best-fitted controller has become an application-dependent process, therefore, this study evaluates different SDN controllers in trem of their effect on the SDN QoS performance. A comparison between the POX and RYU, which are widely used ...
International Journal of Interactive Mobile Technologies (iJIM), 2021
Internet of Things (IoT) systems usually produce massive amounts of data, while the number of dev... more Internet of Things (IoT) systems usually produce massive amounts of data, while the number of devices connected to the internet might reach billions by now. Sending all this data over the internet will overhead the cloud and consume bandwidth. Fog computing's (FC) promising technology can solve the issue of computing and networking bottlenecks in large-scale IoT applications. This technology complements the cloud computing by providing processing power and storage to the edge of the network. However, it still suffers from performance and security issues. Thus, machine learning (ML) attracts attention for enabling FC to settle its issues. Lately, there has been a growing trend in utilizing ML to improve FC applications, like resource management, security, lessen latency and power usage. Also, intelligent FC was studied to address issues in industry 4.0, bioinformatics, blockchain and vehicular communication system. Due to the ML vital role in the FC paradigm, this work will shed ...
Uploads
Papers by shavan askar