Wireless Body Area Sensor Networks (WBASNs) have garnered significant attention due to the implementation of self-automaton and modern technologies. Within the healthcare WBASN, certain sensed data hold greater significance than others in light of their critical aspect. Such vital data must be given within a specified time frame. Data loss and delay could not be tolerated in such types of systems. Intelligent algorithms are distinguished by their superior ability to interact with various data systems. Machine learning methods can analyze the gathered data and uncover previously unknown patterns and information. These approaches can also diagnose and notify critical conditions in patients under monitoring. This study implements two supervised machine learning classification techniques, Learning Vector Quantization (LVQ) and Support Vector Machine (SVM) classifiers, to achieve better search performance and high classification accuracy in a heterogeneous WBASN. These classification techniques are responsible for categorizing each incoming packet into normal, critical, or very critical, depending on the patient's condition, so that any problem affecting him can be addressed promptly. Comparative analyses reveal that LVQ outperforms SVM in terms of accuracy at 91.45% and 80%, respectively.
The educational service one of activities which have great effect in the city life and it's community which considered as an affective instrument for the social and civilized construction and its role in the development of culture and determining the general features of the society. Therefore planning for educational service is considered as a necessary for economical, social and cultural conditions in the Arab community lives in general and the Iraqi community in special. The educational service buildings and distribution forms an insurmountable obstacle in the urban areas. So the balance distribution in Baghdad presents an indication to ensure the equality of educational opportunities besides the correlation of these institutes with th
... Show MoreThe granitoid bodies in the Shalair Valley are structurally located within so-called Iraqi Zagros Suture Zone, in the northeastern Iraq. One hundred and sixty-two representative samples were collected from five granitoid intrusive bodies in the valley: Aulan and Siristan in the northern part, Mishao and Laladar in the southern part and Demamna in the western part. Two major types of granitoids in the eastern and western part of the Shalair Valley area were indentified. The granitoids from the four locations in the eastern part, have similar mineral constitutes. These rocks are composed of plagioclase + quartz ± hornblende with two types of texture, equigranular texture represented by Aulan and Siristan in the northern part and porphyrit
... Show MoreAlthough the number of stomach tumor patients reduced obviously during last decades in western countries, but this illness is still one of the main causes of death in developing countries. The aim of this research is to detect the area of a tumor in a stomach images based on fuzzy clustering. The proposed methodology consists of three stages. The stomach images are divided into four quarters and then features elicited from each quarter in the first stage by utilizing seven moments invariant. Fuzzy C-Mean clustering (FCM) was employed in the second stage for each quarter to collect the features of each quarter into clusters. Manhattan distance was calculated in the third stage among all clusters' centers in all quarters to disclosure of t
... Show MoreThe popular art movement emerged in the mid-fifties in Britain in parallel with its appearance in America.. It was linked to contemporary social reality and what distinguishes this art is the most sophisticated and less aesthetic means and the most blatant in the field of media, ie back to the image used in the media, journalism, magazines, television and photo Which reflect the reality of the neutral artist. This research included the methodological framework represented by the research problem that emerged from pop art as a new experimental vision that emerged in the twentieth century and the importance of the research and its objectives and limits and the definition of terms. The theoretical framework dealt with evolution Technology,
... Show MoreThe 2D imaging survey was conducted across an unknown K- 3 cavity that is located in Haditha area-Western Iraq.2D measurements are collected along two intercrossing traverses above the cavity with 105m length of each one. Dipole-dipole array is performed with n-factor of 6 and a-spacing equals to 5m. The inverse models of 2D imaging technique showed clearly that the resistivity contrast between the anomalous part of cavity and background resistivity of rocks is about 800:100 Ωm .In addition, the invers models showed that the depth from ground surface to the upper roof of cavity approximately equals to 11m near the cavity operator. So, the K-3 cavity is well defined from 2D imaging with Dipole –dipole array in comparison with the actua
... Show MoreThe palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Finding similarities in texts is important in many areas such as information retrieval, automated article scoring, and short answer categorization. Evaluating short answers is not an easy task due to differences in natural language. Methods for calculating the similarity between texts depend on semantic or grammatical aspects. This paper discusses a method for evaluating short answers using semantic networks to represent the typical (correct) answer and students' answers. The semantic network of nodes and relationships represents the text (answers). Moreover, grammatical aspects are found by measuring the similarity of parts of speech between the answers. In addition, finding hierarchical relationships between nodes in netwo
... Show More