Preferred Language
Articles
/
_hdZaI8BVTCNdQwCm3ZY
Using Machine Learning Algorithms to Predict the Sweetness of Bananas at Different Drying Times
...Show More Authors

The consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying time led to an increase in carbohydrates, sweetness, and CIE-L*a*b levels, while it led to a decrease in the moisture content in dried banana slices. Therefore, there is a direct relationship between CIE-L*a*b levels and sweetness. On the other hand, the RF and CART algorithms gave the highest prediction accuracy of 86% and 0.8 on the Kappa measure. While the other algorithms (SVM, LDA, KNN) gave a prediction accuracy of 80% and 0.7 on the Kappa measure. In terms of testing statistical significance, the null hypothesis (H0) was accepted because there is no relationship between the metric distributions of the algorithms used.

Scopus Clarivate Crossref
Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Time Prediction of Dynamic Behavior of Glass Fiber Reinforced Polyester Composites Subjected to Fluctuating Varied Temperatures
...Show More Authors

The reduction of vibration properties for composite material (woven roving E-glass fiber plies in thermosetting polyester matrix) is investigated at the prediction time under varied combined temperatures (60  to -15) using three types of boundary conditions like (CFCF, CCCF, and CFCC). The vibration properties are the amplitude, natural frequency, dynamic elastic moduli (young modulus in x, y directions and shear modulus in 1, 2 plane) and damping factor. The natural frequency of a system is a function of its elastic properties, dimensions, and mass. The woven roving glass fiber has been especially engineered for polymer reinforcement; but the unsaturated thermosetting polyester is widely used, offering a good balance of vibration p

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 10 2018
Journal Name
Ceramics International
Application of zirconia surface coating to improve fracture resistance and stress distribution of zirconia ceramic restorations
...Show More Authors

Zirconia ceramic restoration (ZCR) has a higher fracture incidence rate than metal ceramic restoration. Different surface treatments were used to improve fracture performance of ZCR such as grit blasting (GB) by aluminium oxide powder. This type of surface treatment generate residual stresses on veneering ceramic causing crack initiation and ending with a fracture. In order to overcome the stress generated by GB, zirconia surface coating is used as a surface treatment to improve fracture resistance and to accommodate stresses along the ZCR layers. Fifty zirconia ceramic crowns were fabricated and divided according to the type of surface treatment into three groups; the first group is (ZG), involving 20 cores were coated with a mixture of pa

... Show More
Scopus (4)
Scopus
Publication Date
Sat Apr 01 2023
Journal Name
Heliyon
Application of solar photo-electro-Fenton technology to petroleum refinery wastewater degradation: Optimization of operational parameters
...Show More Authors

View Publication
Scopus (20)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Oct 19 2025
Journal Name
Lecture Notes In Networks And Systems
The Role of Artificial Intelligence in Studying the Impact of Contemporary Revolutions on Political Systems in the Middle East
...Show More Authors

In this study, we tackle the understudied area of Artificial Intelligence (AI) and its role in examining how modern revolutions may affect political systems across the Middle Eastern region. despite hundreds of studies documenting Middle Eastern uprisings over the past three decades, there has been little effort to harness AI to better understand or predict these multifaceted events. This study seeks to address this gap by assessing the performance of AI-intelligence in analyzing (broadly) revolutionary processes and their effects on regional political systems. The research uses a mixedmethod methodology that involves a systematic literature review of contemporary scholarly articles, and an analytics study using AI tools. Our results show t

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 19 2021
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Object Tracking Using Adaptive Diffusion Flow Active Model
...Show More Authors

Object tracking is one of the most important topics in the fields of image processing and computer vision. Object tracking is the process of finding interesting moving objects and following them from frame to frame. In this research, Active models–based object tracking algorithm is introduced. Active models are curves placed in an image domain and can evolve to segment the object of interest. Adaptive Diffusion Flow Active Model (ADFAM) is one the most famous types of Active Models. It overcomes the drawbacks of all previous versions of the Active Models specially the leakage problem, noise sensitivity, and long narrow hols or concavities. The ADFAM is well known for its very good capabilities in the segmentation process. In this

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Innovative Systems Design And Engineering
Automated Surface Defect Detection using Area Scan Camera
...Show More Authors

Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Hexapod Robot Static Stability Enhancement using Genetic Algorithm
...Show More Authors

Abstract

Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each

... Show More
View Publication Preview PDF