The manual classification of oranges according to their ripeness or flavor takes a long time; furthermore, the classification of ripeness or sweetness by the intensity of the fruit’s color is not uniform between fruit varieties. Sweetness and color are important factors in evaluating the fruits, the fruit’s color may affect the perception of its sweetness. This article aims to study the possibility of predicting the sweetness of orange fruits based on artificial intelligence technology by studying the relationship between the RGB values of orange fruits and the sweetness of those fruits by using the Orange data mining tool. The experiment has applied machine learning algorithms to an orange fruit image dataset and performed a co
... Show MoreAttention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w
... Show MoreThis study been conducted and applied in Alrashed Health Center/Mahmodia Sector/ kerigh Sector/Ministry of Health/Baghdad City, and conducted on samples of women who are suffering from iron deficiency (Hemoglobin%) in blood for the year 2013. Fifty women been selected (married, unmarried), their ages ranging between 19-40 years old, they been given dried grinding spinach tablet. The dose been given was 3 tablet/day/4-6 weeks, after taken the percentage of Hemoglobin and Uric acid for all studied samples before and after dried spinach tablet given. It was appeared from samples analysis primarily and statically for 50 women, that 4% upon them only suffering high Iron deficiency (8.0-9.9 mg/100ml), 38% upon them suffering from middle iron def
... Show MoreThree scolopacids out of 150 are found infected with Haemoproteus scolopaci Galli-
Valerio 1929 and H. tringae n. sp. A detailed description of the new taxon is presented along
with a comparison of the diagnostic measurements between the two species.
Diabetes mellitus is a global problem nowadays due to increase the disease cases all over the world, in both the developed and developing countries which may affect the quality of life (QOL ) of diabetic patients. This study was conducted to assess the quality of life of patients with type 2 diabetes mellitus (DM) and to determine some selected clinical and sociodemographic factors that affect the quality of life of these patients in Al Hila city-Iraq. This was a cross sectional study in which 100 patients with type 2 diabetes mellitus attending diabetic outpatient clinics of Merjan Teaching Hospital-Al Hila. To assess the quality of life of those diabetic patients, the World Health Organizations Quality of Life Assessment (WHOQOL) was a
... Show MoreThis study was initiated to examine the tomato-infecting viruses belonging to the Tobamovirus and Potexvirus genera in Iraq. Field observations and surveys were carried out for three successive cropping seasons (2020/21 to 2022/23) in selected tomato production areas. The purpose was to identify the main viruses associated with tomato epidemics and assess the impact of different tomato cultivars on disease occurrence. A total of 700 tomato leaf samples were collected from seven governorates (Baghdad, Diyala, Babylon, Najaf, Kerbala, Nasiriya, and Basrah) and tested using pathogen-specific immunostrip kits. The survey showed a presence of Tomato brown rugose fruit virus (ToBRFV), Tobacco mosaic virus (TMV), Pepper mild mottle virus (
... Show MoreDeep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreSeven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.
The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show More