Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreSodium adsorption ratio (SAR) is considered as a measure of the water suitability for irrigation usage. This study examines the effect of the physicochemical parameters on water quality and SAR, which included Calcium(Ca+2), Magnesium(Mg+2), Sodium (Na+), Potassium (K), Chloride (Cl-), Sulfate(SO4-2), Carbonate (CO3-2), Bicarbonate (HCO3-), Nitrate (NO3-), Total Hardness (TH), Total Dissolved Salts (TDS), Electrical Conductivity (EC), degree of reaction (DR), Boron (B) and the monthly and annually flow discharge (Q). The water samples were collected from three stations across the Tigris River in Iraq, which flows through Samarra city (upstream), Baghdad city (central) and the end of Kut city (downstream) for the periods of 2016-201
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreCoaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThe main problem of this research is the delay of implementation of the investment plan projects for the period (2013-2016) and the weakness of the staff ability in the ministries and they don’t have the sufficient experience to carry out the implementation process.
Therefore, the research aims to evaluate the implementation of programs and projects of the investment plan in a manner consistent with the objectives set for them without any wasteful of efforts, time and money. And then identify the problems and obstacles to determine the deviations of the implementation of the specific for each sector according to the criteria of evaluation and the form of cost, quality, time and implementation.<
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc
... Show MoreThe research aimed to prepare a psychological counseling program for the coaches of the Sports Care Center in the gymnasium, and to learn about the impact of the psychological counseling program in reducing irrational ideas and causal attribution of the coaches of the Sports Talent Care Center in the gymnasium, to assume that there are statistically significant differences between the results of the tribal and posttests of the research group Experimental in the scale of irrational ideas, and there are statistically significant differences between the results of the tribal and posttests of the experimental research group in the scale of the causal attribution scale, The experimental approach was adopted by designing one experimental
... Show More