COVID 19 has spread rapidly around the world due to the lack of a suitable vaccine; therefore the early prediction of those infected with this virus is extremely important attempting to control it by quarantining the infected people and giving them possible medical attention to limit its spread. This work suggests a model for predicting the COVID 19 virus using feature selection techniques. The proposed model consists of three stages which include the preprocessing stage, the features selection stage, and the classification stage. This work uses a data set consists of 8571 records, with forty features for patients from different countries. Two feature selection techniques are used in order to select the best features that affect the prediction of the proposed model. These are the Recursive Feature Elimination (RFE) as wrapper feature selection and the Extra Tree Classifier (ETC) as embedded feature selection. Two classification methods are applied for classifying the features vectors which include the Naïve Bayesian method and Restricted Boltzmann Machine (RBM) method. The results were 56.181%, 97.906% respectively when classifying all features and 66.329%, 99.924% respectively when classifying the best ten features using features selection techniques.
This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com
... Show More: In modern optical communication system, noise rejection multiple access interference (MAI) must be rejected in dense access network (DAN). This paper will study the dual optical band pass and notch filters. They will be extracted with tunable FWHM using 10cm (PMF) with different cladding diameters formed with etching 125μm PMF after immersing it with 40% of hydrofluoric acid (HF). This fiber acts as assessing fiber to perform Sagnac interferometer with splicing regions that placed 12cm (SMF) for performing hybrid Sagnac interferometer that consists of Mach-Zehnder instead of Sagnac loop which is illuminated by using laser source with centroid wavelength of 1546.7nm and FWHM of 286 pm or 9 ns in the time domain. . Firs
... Show MoreThe accurate 3-D coordinate's measurements of the global positioning systems are essential in many fields and applications. The GPS has numerous applications such as: Frequency Counters, Geographic Information Systems, Intelligent Vehicle Highway Systems, Car Navigation Systems, Emergency Systems, Aviations, Astronomical Pointing Control, and Atmospheric Sounding using GPS signals, tracking of wild animals, GPS Aid for the Blind, Recorded Position Information, Airborne Gravimetry and other uses. In this paper, the RTK DGPS mode has been used to create precise 3-D coordinates values for four rover stations in Baghdad university camp. The HiPer-II Receiver of global positioning system was used to navigate the coordinate value. The results wil
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIn this paper, a fusion of K models of full-rank weighted nonnegative tensor factor two-dimensional deconvolution (K-wNTF2D) is proposed to separate the acoustic sources that have been mixed in an underdetermined reverberant environment. The model is adapted in an unsupervised manner under the hybrid framework of the generalized expectation maximization and multiplicative update algorithms. The derivation of the algorithm and the development of proposed full-rank K-wNTF2D will be shown. The algorithm also encodes a set of variable sparsity parameters derived from Gibbs distribution into the K-wNTF2D model. This optimizes each sub-model in K-wNTF2D with the required sparsity to model the time-varying variances of the sources in the s
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreFurfural is one of the one of pollutants in refinery industrial wastewaters. In this study advanced oxidation process using UV/H2O2 was investigated for furfural degradation in synthetic wastewater. The results from the experimental work showed that the degradation of furfural decreases as its concentration increases, reaching 100% at 50mg/l furfural concentration and increasing the concentration of H2O2 from 250 to 500 mg/l increased furfural removal from 40 to 60%.The degradation of furfural reached 100% after 90 min exposure time using two UV lamps, where it reached 60% using one lamp after 240 min exposure time. The rate of furfural degradation k increased at the pH and initial concentratio
... Show More