Preferred Language
Articles
/
WxeRP48BVTCNdQwC8Gag
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such as decision tree and nearest neighbor search. The proposed method can handle streaming data efficiently and, for entropy discretization, provide su the optimal split value.

Scopus Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Sat May 28 2022
Journal Name
Abstract And Applied Analysis
Discretization Fractional-Order Biological Model with Optimal Harvesting
...Show More Authors

In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.

View Publication
Scopus Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
On Free Resolution of Weyl Module and Zero Characteristic Resolution In The Case of Partition (8,7,3)
...Show More Authors

View Publication Preview PDF
Scopus (12)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
The Effect of Temporal Resolution of Climatic Factors on Agriculture Degradation in Southern Baghdad by Applying Remote Sensing Data
...Show More Authors

       The climate changes had been recognized as one of the major factors responsible for land degradation, which has a significant impact on diverse aspects. The present study aims to estimate how the climate change can influence land degradation in the south areas of Baghdad province (Al-Rasheed, Al-Mahmudiyah, Al-Yusufiyah, Al-Madaen, and Al-Latifiyah). The Satellite Landsat-8 OLI and satellite Landsat-5 TM sensor imagery were used to extent land degradation for the period (2010-2019). ArcGIS V.10.4 was applied to manage and analysis the satellite image dataset, including the use of climate factors data from the European Center for Climate Forecasts (ECMWF) by reanalyzes and extraction datasets. To achieve work objectives, many

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Classification and monitoring of autism using svm and vmcm
...Show More Authors

Autism is a lifelong developmental deficit that affects how people perceive the world and interact with each others. An estimated one in more than 100 people has autism. Autism affects almost four times as many boys than girls. The commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more recently "eye tracking". A preliminary study on eye tracking trajectories of patients studied, showed a rudimentary statistical analysis (principal component analysis) provides interesting results on the statistical parameters that are studied such as the time spent in a region of interest. Another study, involving tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients also showed interesting results. In this

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Entropy-Based Feature Selection using Extra Tree Classifier for IoT Security
...Show More Authors

      The Internet of Things (IoT) is a network of devices used for interconnection and data transfer. There is a dramatic increase in IoT attacks due to the lack of security mechanisms. The security mechanisms can be enhanced through the analysis and classification of these attacks. The multi-class classification of IoT botnet attacks (IBA) applied here uses a high-dimensional data set. The high-dimensional data set is a challenge in the classification process due to the requirements of a high number of computational resources. Dimensionality reduction (DR) discards irrelevant information while retaining the imperative bits from this high-dimensional data set. The DR technique proposed here is a classifier-based fe

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Strengthening of RC Beam with Large Square Opening Using CFRP
...Show More Authors

The use of essential services in modern constructions, such pipes, and ducts, became important, placing these pipes and ducts underneath the soffit of the beam. They made a ceiling sandwich, and that causes to reduce the height of the floor, so the presence of the opening in the beam saves the height of the floor.  In this paper, the investigation of the beam response of reinforced concrete simply supported rectangle beams with square web openings is presented, including a number of the web openings (two, four, and eight), in addition to its use in strengthening the member at the openings (when the beam is planned before casting, internal deformation steel bar is used, and in case of the opening is existing in the b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Optimal Harvesting Strategy of a Discretization Fractional-Order Biological Model
...Show More Authors

     Optimal control methods are used to get an optimal policy for harvesting renewable resources. In particular, we investigate a discretization fractional-order biological model, as well as its behavior through its fixed points, is analyzed. We also employ the maximal Pontryagin principle to obtain the optimal solutions. Finally, numerical results confirm our theoretical outcomes.

View Publication Preview PDF
Scopus (2)
Scopus Crossref