Preferred Language
Articles
/
FBeUSI8BVTCNdQwCNmm0
Using Machine Learning Algorithms to Predict the Sweetness of Bananas at Different Drying Times
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Using Information and Communication Technology to Improving the Quality of Blended Learning Elements’, a Survey Study at the Technical College of Management /Baghdad
...Show More Authors

 The research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum).  The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Babylon University Journal\applied Pure Sciences
Detection of the perfect condition to produce the tannase from Aspergillus niger at different medium
...Show More Authors

Publication Date
Sat Jan 09 2021
Journal Name
Review Of International Geographical Education
E-Learning Applications According To The Levels Of STEM Literacy For Teachers Of Physics At The Secondary Stage
...Show More Authors

E-learning applications according to the levels of enlightenment (STEM Literacy) for physics teachers in the secondary stage. The sample consists of (400) teachers, at a rate of (200) males (50%), and (200)females (50%), distributed over (6) directorates of education in Baghdad governorate on both sides of Rusafa and Karkh. To verify the research goals, the researcher built a scale of e-learning applications according to the levels of STEM Literacy, which consists of (50) items distributed over (5) levels. The face validity of the scale and its stability were verified by extracting the stability coefficient through the internal consistency method “Alf-Cronbach”. The following statistical means were used: Pearson correlation coefficient,

... Show More
Publication Date
Mon Oct 30 2023
Journal Name
Aro-the Scientific Journal Of Koya University
Enhancing Upper Limb Prosthetic Control in Amputees Using Non-invasive EEG and EMG Signals with Machine Learning Techniques
...Show More Authors

Amputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 02 2016
Journal Name
Australian Journal Of Basic And Applied Sciences
Full synchronization of 2$\times$ 2 optocouplers network using LEDs
...Show More Authors

The synchronization of a complex network with optoelectronic feedback has been introduced theoretically, with use of 2×2 oscillators network; each oscillator considered is an optocoupler (LED coupled with photo-detector). Fixing the bias current (δ) and increasing the feedback strength (Ԑ) of each oscillator, the dynamical sequence like chaotic and periodic mixed mode oscillations has been observed. Synchronization of unidirectionally coupled of light emitting diodes network has been featured when coupling strength equal to 1.7×10-4. The transition between non-synchronization and synchronization states by means of the spatio-temporal distribution has been investigated.

Publication Date
Tue Mar 01 2022
Journal Name
Asian Journal Of Applied Sciences
Comparison between Expert Systems, Machine Learning, and Big Data: An Overview
...Show More Authors

Today, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.

View Publication
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet-Based Feature Extraction for Cassava Classification: A Machine Learning Approach
...Show More Authors

Cassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More