Preferred Language
Articles
/
1RZlV4cBVTCNdQwCDkZZ
Comparison between Expert Systems, Machine Learning, and Big Data: An Overview
...Show More Authors

Today, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.

Crossref
View Publication
Publication Date
Wed Apr 01 2009
Journal Name
6th.engineering Conference/college Of Eng. /university Of Baghdad
Comparison between analytical solution and experimental results for reinforced loose sand
...Show More Authors

Presents here in the results of comparison between the theoretical equation stated by Huang and Menq and laboratory model tests used to study the bearing capacity of square footing on geogrid-reinforced loose sand by performing model tests. The effects of several parameters were studied in order to study the general behavior of improving the soil by using the geogrid. These parameters include depth of first layer of reinforcement, vertical spacing of reinforcement layers, number of reinforcement layers and types of reinforcement layers The results show that the theoretical equation can be used to estimate the bearing capacity of loose sand.

Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Comparison Between ESP and Gas Lift in Buzurgan Oil field/Iraq
...Show More Authors

Buzurgan oil Field which is located in south of Iraq has been producing oil for five decades that caused production to drop in many oil wells. This paper provides a technical and economical comparison between the ESP and gas lift in one oil well (Bu-16) to help enhancing production and maximize revenue. Prosper software was used to build, match and design the artificial lift method for the selected well, also to predict the well behavior at different water cut values and its effect on artificial lift method efficiency. The validity of software model was confirmed by matching, where the error difference value between actual and calculated data was (-1.77%).

The ESP results showed the durability of ESP regarding th

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Comparison Between the Performance of Human Translators and AI-Supported Applications
...Show More Authors

This study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Academic Science Journal
Comparison between MDDV and VADD routing protocols in VANET (Case Study)
...Show More Authors

Routing is the process of delivering a packet from a source to a destination in the network using a routing algorithm that tries to create an efficient path. The path should be created with minimum overhead and bandwidth consumption. In literature, routing protocols in VANET were categorized in many ways, according to different aspects. In the present study, we prefer the classification based on the number of hops to reach the destination node. In literature, these are single-hop and multi-hops protocols. We first discuss the two types and then compare the MDDV (multi-hops protocol) with VADD (single-hop protocol). The comparison is theoretically and experimentally implemented by providing a network environment consisting of SUMO, VIENS and

... Show More
View Publication
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of big data analytics in measuring and analyzing the quality costs of economic units : applied research in the Iraqi company for seed production
...Show More Authors

                The research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Aro-the Scientific Journal Of Koya University
Enhancing Upper Limb Prosthetic Control in Amputees Using Non-invasive EEG and EMG Signals with Machine Learning Techniques
...Show More Authors

Amputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Comparison of Groundwater Quality and Quantity between Al-Rahbah and Al-Haydariyah Regions
...Show More Authors

This study focused on two areas in AL-Najaf city, AL-Ruhbah and Al-Haydariyah regions because of the importance and widespread use of groundwater in these areas. The two areas were compared quantitatively and qualitatively. For the quantitative approach, the GMS software was used in conjunction with the GIS software to simulate the groundwater flow behavior. The solid model for both areas was created, the geological formation was determined, and the hydraulic properties were identified using GMS software. To test the quantity of groundwater in both areas, the wells have been redistributed to a distance of 2000 m between them, and a period of 1000 days was chosen. When a discharge of 10 l/s and operation times of 4, 8, an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Al-kindy College Medical Journal
Brain Endoscopy, a big neurosurgical revolution
...Show More Authors

Endoscopy is a rapidly growing field of Neurosurgery, it is defined as the applying of endoscope to treat different conditions of brain pathology within cerebral ventricular system and beyond it, endoscopic procedures performed by using different equipment and recording system to make a better visualization enhancing the surgeon's view by increasing illumination and magnification to look around corner and to capture image on video or digital format for later studies.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Geological Journal
Permeability Prediction and Facies Distribution for Yamama Reservoir in Faihaa Oil Field: Role of Machine Learning and Cluster Analysis Approach
...Show More Authors

Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref