Preferred Language
Articles
/
_hdZaI8BVTCNdQwCm3ZY
Using Machine Learning Algorithms to Predict the Sweetness of Bananas at Different Drying Times
...Show More Authors

The consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying time led to an increase in carbohydrates, sweetness, and CIE-L*a*b levels, while it led to a decrease in the moisture content in dried banana slices. Therefore, there is a direct relationship between CIE-L*a*b levels and sweetness. On the other hand, the RF and CART algorithms gave the highest prediction accuracy of 86% and 0.8 on the Kappa measure. While the other algorithms (SVM, LDA, KNN) gave a prediction accuracy of 80% and 0.7 on the Kappa measure. In terms of testing statistical significance, the null hypothesis (H0) was accepted because there is no relationship between the metric distributions of the algorithms used.

Scopus Clarivate Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Dynamic Response of a Nonlinear Fabry-Perot Etalon for Various Medium Response Times
...Show More Authors

     In this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Nov 14 2021
Journal Name
Palarch's Journal Of Archaeology Of Egypt/egyptology
Blended Learning in Teaching English to University Students
...Show More Authors

QJ Rashid, IH Abdul-Abbas, MR Younus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 4

View Publication
Publication Date
Tue Nov 03 2020
Journal Name
Modern Sport
The effect of using multimedia in learning the skill of passing from the bottom of volleyball
...Show More Authors

The aim of the research is to:. Preparation and implementation of special educational units using multimedia to learn the skill of scrolling from below. 2 to recognize the impact of the use of multimedia in learning the skill of scrolling from below. 3 to identify the differences between the tests after the two groups research in learning the skill of passing from the bottom volleyball. The research represented the students of the first stage and the sample of the research was drawn randomly and the number of (50) students were divided into two experimental and control groups and each group (25) students were used standardized tests and conducting pre-tests and the implementation of the main exp

... Show More
View Publication
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Teaching Practices of Faculty Members in Northern Border University According to the Brain-Based Learning Theory
...Show More Authors

The present study aims to identify the most and the least common teaching practices among faculty members in Northern Border University according to brain-based learning theory, as well as to identify the effect of sex, qualifications, faculty type, and years of experiences in teaching practices. The study sample consisted of (199) participants divided into 100 males and 99 females. The study results revealed that the most teaching practice among the study sample was ‘I am trying to create an Environment of encouragement and support within the classroom which found to be (4.4623). As for the least teaching practice was ‘I use a natural musical sounds to create student's mood to learn’ found to be (2.2965). The study results also in

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Conductometric Studies of Aqueous Solution of Thymine and Adenosine At Different Temperatures
...Show More Authors

Molar conductivity of different concentrations of thymine and adenosine in water , sodium acetate and ammonium chloride solution at different temperatures , 283. 15-323.15 K has been determined from direct conductivity measurements , examination of aqueous mixture of thymine and adenosine with Onsager equation reveal deviation from linearity at high concentration .This deviation was explained in term of molecular interaction . Ostwald dilution law also examined with the above mixtures lead to calculation of limiting molar conductivities and dissociation constants of both nucleic acid in water , sodium acetate and ammonium chloride. The agreement between the values obtained for Onsager equa

... Show More
Publication Date
Sun Dec 01 2024
Journal Name
Materials Letters
Determination of third order susceptibility of carbon quantum dots at different concentrations
...Show More Authors

The nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Biological Effect of Different Concentrations of Bacillus Thurngensis Isolated From The Soils of Sawa Lake, Al Muthanna Governorate on The of Hypera postica at Different Time Periods
...Show More Authors
Abstract<p>This study conduct in Al-Muthanna governorate to assess five concentrations of <italic>Bacillus</italic> thurngensisagonist <italic>Hyperapostica</italic>. The results showed the presence of <italic>Bacillus thurngensisin</italic> all the studied sites of Lake Sawa in Muthanna Governorate, and the rates of its presence were close to the same sites, and the rate of its presence in those sites was 35%, and its highest rate was recorded in the north and east of the lake, as it reached 40% and the lowest amounted to 30% in the two sites south and west site. The results of the study showed that five concentrations were taken from bacterial isolates of <it></it></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref