Erbil, Iraq
Erbil, Iraq

Ishik University is a private university owned by Fezalar Educational Institution. Ishik University was established in 2008 with the permission of the Ministry of Higher Education and Scientific Research of Kurdistan Region, Iraq. Ishik University has the following colleges in its new campus: College of Dentistry, College of Engineering, College of Economics & Administrative science, College of Education, College of Arts & science, College of Law. The university also hosts a Language Prep School, a Continuing Education Center and a Prometric Testing Center. Wikipedia.

Time filter
Source Type

Hussein S.M.,Ishik University
Proceedings - 2016 International Conference on Computational Science and Computational Intelligence, CSCI 2016 | Year: 2017

With the rapidly growth of technology, used Internet become an important part in human life it used in many sectors of society, communicating over global network, sending or receiving sensitive data is risk because different techniques are used by attackers to intercept and exposed data. As a result, strong security technique is required to guaranteeing the user data. Many methods proposed to improve security issues. Intrusion detection system (IDS) is used to observe unwanted action on network systems and individual computers. However due to opposite effect of using IDS, using individual methods of IDS only misuse or anomaly attacks can be detected. This paper proposed a model that integrates both approaches signature and anomaly based of IDS to reduce obtained alerts and detects new attacks. False alarm rate, accuracy, and detect attacks are the parameters used to evaluate effectiveness of hybrid IDS in addition Knowledge Discovery Data Mining (KDD) CUP 99 dataset and Waikato Environment for Knowledge Analysis (WEKA) program has been used for testing the proposed hybrid IDS. © 2016 IEEE.

Tug O.,Ishik University | Basar F.,Fatih University
AIP Conference Proceedings | Year: 2016

In this study, we introduce some new double sequence spaces B(Mu), B(Cp), B(Cbp), B(Cr) and B(Lq) as the domain of four-dimensional generalized difference matrix B(r,s,t,u) in the spaces Mu, Cp, Cbp, Cr and Lq, respectively. We show that the double sequence spaces B(Mu), B(Cbp) and B(Cr) are the Banach spaces under some certain conditions. We give some inclusion relations with some topological properties. © 2016 Author(s).

Shukri M.T.,Ishik University | Ahmed J.K.,Ishik University | Muhie O.,Ishik University
Jordan Journal of Civil Engineering | Year: 2017

Scour is a natural phenomenon caused by the erosive action of flowing stream on alluvial beds, which removes the sediment around or near structures located in flowing water. It means the lowering of the riverbed level by water erosions, such that there is a tendency to expose the foundations of a structure. It is the result of the erosive action of flowing water, excavating and carrying away material from the bed and banks of streams and from around the piers of bridges. The failure of bridges due to excessive local scour during floods poses a challenging problem to hydraulic engineers. The failure of bridge piers is due to many reasons, such as localized scour combined with general riverbed degradation. In this paper, we tried to estimate the temporal variation of scour depth at non-uniform cylindrical bridge pier, by an experimental work carried out in the civil engineering hydraulic laboratories of Gaziantep University on a channel with dimensions of 8.3m length, 0.8m width and 0.9m depth. Experiments have been carried out at 20 cm depth of a sediment layer with d50=0.4 mm. Three bridge pier shapes having different scaled models have been constructed in a 1.5m test section in the channel. © 2017 JUST. All Rights Reserved.

Okmen O.,Genel | Oztas A.,Ishik University
Journal of the South African Institution of Civil Engineering | Year: 2014

Construction projects are prone to uncertainty due to various risk factors, such as unexpected weather conditions and soil properties. Depending on this, the actual duration of activities frequently deviates from the estimated duration time in either favourable or adverse directions. For this reason, evaluation of uncertainty is required to make the correct decisions when managing construction project network schedules. In this regard, this paper presents a new computer-aided schedule risk analysis model - the Fuzzy Schedule Risk Analysis Model - to evaluate uncertain construction activity networks when activity duration and risk factors are correlated. The proposed model utilises Monte Carlo Simulation and a fuzzified Critical Path Method procedure conducted by fuzzy sets and fuzzy operations. The paper also includes an example application of the model to a housing project. The findings of this application show that the model operates well and produces realistic results in capturing correlation indirectly between activity durations and risk factors regarding the extent of uncertainty inherent in the schedule. © 2014, South African Institute of Civil Engineers. All rights reserved.

Okmen O.,Genel | Oztas A.,Ishik University
Journal of the South African Institution of Civil Engineering | Year: 2014

The Critical Path Method (CPM), which is used to schedule construction activities that depend on one another through network relationships, is deterministic with regard to the duration assigned to the execution of the activities and the results produced in certain values. Unfortunately, construction activities are performed under uncertain conditions. Project risks cause variations in activity duration, and in turn the entire network is affected by uncertainty. In this context, activity duration can be represented by fuzzy sets, and CPM network calculations can be performed by fuzzy operations through a method developed in this study. Since the duration of activities is represented by fuzzy sets, and network calculations can be performed by fuzzy operations, the activity early/late start/finish times and the project completion time are calculated as fuzzy sets by the proposed method. An example CPM application with fuzzy sets is also presented in the paper. The findings show that CPM is applicable with fuzzy sets, and the developed method operates well for modelling the uncertainty in CPM calculations. © 2014, South African Institute of Civil Engineers. All rights reserved.

Rashid T.A.,Salahaddin University Erbil | Al-Radhy R.S.,Ishik University
Proceedings of IEEE International Conference on Teaching, Assessment and Learning for Engineering: Learning for the Future Now, TALE 2014 | Year: 2015

There is a high demand from academic centers, business firms and marketplaces for highly qualified expertise in database areas. As a result, it is undoubtedly fundamental for academic researchers in the field of databases and education to conduct more research works so that to enhance teaching, learning, and assessing methods of database courses. This paper describes the salient features of these databases courses and highlights the issues of traditional teaching/learning/assessing methods of database courses at universities in Kurdistan in general. This paper also provides comprehensive reformations to those issues. © 2014 IEEE.

Okmen O.,Ministry of Transport | Oztas A.,Ishik University
Engineering, Construction and Architectural Management | Year: 2015

Purpose: Actual costs frequently deviate from the estimated costs in either favorable or adverse direction in construction projects. Conventional cost evaluation methods do not take the uncertainty and correlation effects into account. In this regard, a simulation-based cost risk analysis model, the Correlated Cost Risk Analysis Model, previously has been proposed to evaluate the uncertainty effect on construction costs in case of correlated costs and correlated risk-factors. The purpose of this paper is to introduce the detailed evaluation of the Cost Risk Analysis Model through scenario and sensitivity analyses. Design/methodology/approach: The evaluation process consists of three scenarios with three sensitivity analyses in each and 28 simulations in total. During applications, the model's important parameter called the mean proportion coefficient is modified and the user-dependent variables like the risk-factor influence degrees are changed to observe the response of the model to these modifications and to examine the indirect, two-sided and qualitative correlation capturing algorithm of the model. Monte Carlo Simulation is also applied on the same data to compare the results. Findings: The findings have shown that the Correlated Cost Risk Analysis Model is capable of capturing the correlation between the costs and between the risk-factors, and operates in accordance with the theoretical expectancies. Originality/value: Correlated Cost Risk Analysis Model can be preferred as a reliable and practical method by the professionals of the construction sector thanks to its detailed evaluation introduced in this paper. © Emerald Group Publishing Limited.

Koran S.,Ishik University
International Journal of Applied Linguistics and English Literature | Year: 2015

Teachers are seen as the major determinant sources of motivation for language learners. Moreover, teachers are expected to enhance learners’ motivation for better language learning since the positive effect of this relationship on the students’ achievement has been proved in many studies. Thus, the effect of motivation is crucial to students’ achievements because even people with the required knowledge, skills, and abilities will perform poorly if they are not motivated to devote their time and effort to work (Harris in Milapo, 2001:29). The purpose of the study is to explore researches and theories concerning EFL/ESL learners’ motivation, the role of teachers in students’ motivation; how they can initiate and maintain it. Moreover, this study aims to identify strategies obtained from the literature on motivation and suggest motivational techniques appropriate to be used by teachers in Iraq. © 2015, Australian International Academic Centre PTY LTD. All rights reserved.

Al-Mously S.I.,Ishik University
Communications in Computer and Information Science | Year: 2011

This paper presents a procedure for the evaluation of the Electromagnetic (EM) interaction between the mobile phone antenna and human head, and investigates the factors may influence this interaction. These factors are considered for different mobile phone handset models operating in the GSM900, GSM1800/DCS, and UMTS/IMT-2000 bands, and next to head in cheek and tilt positions, in compliance with IEEE-standard 1528. Homogeneous and heterogeneous CAD-models were used to simulate the mobile phone user's head. A validation of our EM interaction computation using both Yee-FDTD and ADI-FDTD was achieved by comparison with previously published works. © 2011 Springer-Verlag Berlin Heidelberg.

Kattan A.,Ishik University | Aboalmaaly M.F.,Universiti Sains Malaysia
Proceedings of the 11th International Conference on Electronics, Computer and Computation, ICECCO 2014 | Year: 2014

Potholes, debris, sunken manhole covers and others are common street safety hazards drivers experience daily as they 'bump' into them unexpectedly while driving. The repair and maintenance process by municipals is an ongoing effort that requires periodic streets inventory to guarantees safety. Unless someone reports the location of a street problem, such process cannot take place. This paper presents a simple, yet an effective technique to aid in reporting such street hazards automatically using a smartphone application. The smartphone's accelerometer is used to detect bumps during driving and report the data and location to cloud service. The cloud application utilizes an artificial neural network that is trained to differentiate between a 'shock' resulting from normal driving maneuvers from those possibly resulting from road problem. It also analyzes the location and based on the frequency of reporting a certain 'shock' data from the same geographical location it reports a street hazard location. The city's municipal can then take the suitable actions for inspection and repairs. Promising results were obtained by using a preliminary test implementation indicating the effectiveness of the proposed technique. © 2014 IEEE.

Loading Ishik University collaborators
Loading Ishik University collaborators