Preferred Language
Articles
/
bhY_SIcBVTCNdQwCZkEM
Local Drug Delivery Systems for Treating Periodontal Diseases: A Review of Literature
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Artificial Neural Network and Latent Semantic Analysis for Adverse Drug Reaction Detection
...Show More Authors

Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (8)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Nov 17 2021
Journal Name
International Journal Of Knowledge Management
Assessing the Success of the Perceived Usefulness for Knowledge Management Systems
...Show More Authors

Recently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Journal Of Al-ma'moon College
Simulation and Implementation of SNR Measurement processor for Adaptive Communication Systems
...Show More Authors

Preview PDF
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2016
Journal Name
International Journal Of Advanced Research In Biological Sciences (ijarbs)
The effect of obesity on the periodontal health status
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Ace Journal Of Clinical Chemistry And Laboratory Medicine
Comparison Between of Five Drugs Anti‐Virus for COVID‐19th in Chemicals Properties and Pharmacological Effectiveness: A Review
...Show More Authors

The corona virus epidemic outbreak has urged an extreme worldwide effort for re‐purposing obtainable approved medications for its treatment. In this review, we're focusing on the chemicals properties andpharmacologicaleffectiveness of medicationsofsmallmolecule that are presently being evaluated in clinical trials for the management of corona virus (COVID‐19). The current review sheds light on a number of drugs that have been diagnosed to treat COVID‐19 and their biological effects.

Publication Date
Fri Feb 19 2021
Journal Name
Annals Of Telecommunications
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper
...Show More Authors

Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de

... Show More
View Publication
Scopus (11)
Crossref (13)
Scopus Clarivate Crossref