Preferred Language
Articles
/
1RZlV4cBVTCNdQwCDkZZ
Comparison between Expert Systems, Machine Learning, and Big Data: An Overview
...Show More Authors

Today, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.

Crossref
View Publication
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
ORGANIZATIONAL VALUES AND ITS IMPACT ON STRATEGIC PERFORMANCE A field study a comparison between Two Universities of Baghdad & Al-Nahrain
...Show More Authors

 

ABSTRACT

     The researcher seeks to shed light on the relationship analysis and the impact between organizational values in all its dimensions (Administration Management, Mission, relationship management, environmental management) and strategic performance (financial perspective, customer perspective, the perspective of internal processes, learning and development) in the presidency of Two Universities of Baghdad & Al-Nahrain, it has been formulating three hypotheses for this purpose.

      The main research problem has been the following question: Is there a relationship and the impact of bet

... Show More
View Publication
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparison between HSV-1 Ag detection techniques by ELISA and real-time PCR in breast cancer patients suffering from periodontitis
...Show More Authors

Background: Periodontitis is a long-standing infection that destroys the gums, periodontal ligaments, and the alveolar bone that supports the teeth. Inflammation of the gums and chronic periodontitis are both caused by the bacteria in the dental plaque and the herpes viruses, especially types 1 and 2 of the herpes simplex virus.

Objectives: To compare the ELISA and real-time PCR as ways to detect the herpes simplex virus in breast cancer pat

J Fac Med Baghdad

2023; Vol.65, No. 3

Received:March., 2023

Accepted: June. 2023

Published: Oct. 2023

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 08 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Data Analytics and Techniques
...Show More Authors

Big data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide

... Show More
View Publication
Crossref (5)
Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Correlation of Penetration Rate with Drilling Parameters For an Iraqi Field Using Mud Logging Data
...Show More Authors

This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Application of Velocity Analysis Picking for 2D Seismic Data Processing in West An-Najaf Are
...Show More Authors

     In the current study, 2D seismic data in west An-Najaf (WN-36 line) were received after many steps of processing by Oil Exploration Company in 2018. Surface Consistent Amplitude Compensation (SCAC) was applied on the seismic data. The processing sequence in our study started by sorting data in a common mid-point (CMP) gather, in order to apply the velocity analysis using Interactive Velocity Analysis Application (INVA) with Omega system. Semblance of velocity was prepared to preform normal move-out (NMO) vs. Time. Accurate root mean square velocity (VRMS) was selected, which was controlled by flatness of the primary events. The resultant seismic velocity section for the study area shows that the veloci

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jul 01 2011
Journal Name
25th International Cartographic Conference
User generated content and formal data sources for integrating geospatial data
...Show More Authors

Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o

... Show More
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Machining Polylines and Ellipses using Three-Axis CNC Milling Machine
...Show More Authors

CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.

View Publication Preview PDF
Publication Date
Sat Oct 31 2020
Journal Name
Eastern-european Journal Of Enterprise Technologies
Design and development of high-accuracy machine for wire bending
...Show More Authors

View Publication
Scopus Crossref