Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreChronic myeloid leukemia (CML), is one of the myeloproliferative disorders with a characteristic cytogenetic abnormality resulting in the BCR-ABL fusion gene. Imatinib Mesylate is an effective agent for treating patients in all stages of CML. According to the annual Iraqi cancer registry 2019, the total number of chronic myeloproliferative disorders was 338. The percentage and incidence rates were 0.94% and 0.86%, respectively, with a higher incidence rate in males than females (1.12 in males and 0.60 in females). In this registry, no details about CML, so this study aimed to estimate the number of CML patients who attended the national center of hematology from 2005 until 2020 and investigate their epidemiological and clinic-pathol
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreActivity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show MoreTwitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe aim of the research was to investigate the use of non-parametric tests in the analysis of the questionnaire and how to choose the appropriate test for testing the hypothesis of the study of crime motives in Khartoum State. The data were collected through the primary sources by designing a questionnaire and distributed to a sample of inmates in Khartoum state; the data were analysis by SPSS program using the analytical statistical method through using some of the suitable non-parametric tests for each case. The most important results of the research were: there was significant relationship between the type of crime and the age group therefore, we found that the age group (20-29) was the most frequent crime particularly, the fi
... Show MorePhlebotomus papatasi sand fly is the main vector of Zoonotic Cutaneous Leishmaniasis (ZCL) in Iraq. The aim of this study was to assess and predict the effects of climate change on the distribution of the cutaneous leishmaniasis (CL) cases and the main vector presently and in the future. Data of the CL cases were collected for the period (2000-2018) in addition to sand fly (SF) abundance. Geographic information system, R studio and MaxEnt (Maximum entropy niche model) software were used for analysis and predict effect of (elevation, population, Bio1-19, and Bio28-35) on CL cases distribution and SF occurrence. HadGEM2-ES model with two climate change scenarios, RCP 4.5 and RCP 8.5 were used for future projections 2050. The results showed th
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
Sustainable human development means meeting the basic needs of society and striving for continuous improvement in quality, as it seeks to increase economic well-being while providing adequate housing and nutrition, as well as providing electricity, water, health and education services . Ten centuries ago, Islam highlighted the importance of the development effort and the necessity of its sustainability before the West took it in the 1970s. There are a number of challenges that greatly affect the reality of achieving and ensuring Millennium Development Goals. The research recommends the importance of fighting administrative and financial corruption, as this is one of the biggest challenges facing the possibility of advancing the economy and
... Show More