Preferred Language
Articles
/
bsj-3823
PDCNN: FRAMEWORK for Potato Diseases Classification Based on Feed Foreword Neural Network
...Show More Authors

         The economy is exceptionally reliant on agricultural productivity. Therefore, in domain of agriculture, plant infection discovery is a vital job because it gives promising advance towards the development of agricultural production. In this work, a framework for potato diseases classification based on feed foreword neural network is proposed. The objective of this work  is presenting a system that can detect and classify four kinds of potato tubers diseases; black dot, common scab, potato virus Y and early blight based on their images. The presented PDCNN framework comprises three levels: the pre-processing is first level, which is based on K-means clustering algorithm to detect the infected area from potato image. The second level is features extraction which extracts features from the infected area based on hybrid features: grey level run length matrix and 1st order histogram based features. The attributes that extracted from second level are utilized in third level using FFNN to perform the classification process. The proposed framework is applied to database with different backgrounds, totally 120 color potato images, (80) samples used in training the network and the rest samples (40) used for testing. The proposed PDCNN framework is very effective in classifying four types of potato tubers diseases with 91.3% of efficiency.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Civil And Environmental Engineering
Prediction of the Delay in the Portfolio Construction Using Naïve Bayesian Classification Algorithms
...Show More Authors
Abstract<p>Projects suspensions are between the most insistent tasks confronted by the construction field accredited to the sector’s difficulty and its essential delay risk foundations’ interdependence. Machine learning provides a perfect group of techniques, which can attack those complex systems. The study aimed to recognize and progress a wellorganized predictive data tool to examine and learn from delay sources depend on preceding data of construction projects by using decision trees and naïve Bayesian classification algorithms. An intensive review of available data has been conducted to explore the real reasons and causes of construction project delays. The results show that the postpo</p> ... Show More
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Nov 03 2020
Journal Name
Iium Medical Journal Malaysia
Role of the Immunohistochemical Marker (Ki67) in Diagnosis and Classification of Hydatidiform Mole
...Show More Authors

Introduction: Since the hallmark of gestational trophoblastic disease is trophoblastic proliferation, Ki67 is regarded as the best marker in studying hydatidiform mole.This study was conducted to evaluate the role of this proliferative marker in distinguishing among hydropic abortion, partial and complete hydatidiform mole. Materials and methods: This is a cross sectional study involving the application of Ki67 on a total of 90 histological samples of curetting materials from molar (partial and complete mole) and non molar hydropic abortion belong to Iraqi females, so three study groups were created. Immunohistochemical expression in villous cytotrophoblasts, syncytiotrophoblasts and stromal cells were recorded separately by three i

... Show More
View Publication
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Sumer Journal For Pure Science
Classify the Nutritional Status of Iraqi children under Five Years Using Fuzzy Classification
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Jun 28 2021
Journal Name
Journal Of The College Of Education For Women
Teaching Arabic to Non-Native Speakers between Communication and Pragmatics:Qualitative Approach in Light of the Common European Framework of Reference for Teaching Foreign Languages: هداية تاج الأصفياء حسن البصري
...Show More Authors

This research is qualitative in nature. It aims to investigate descriptively, analytically, and comparatively the modern AK model represented by the Sudan Open University Series, and the European framework, the common reference for Teaching Foreign Languages, to uncover what was achieved in them in terms of communication and language use. Accordingly, an integrated, multi-media approach has been adopted to enable the production and reception activities, and the spread of Arabic in vast areas of the world. Such a spread helps Arabic language to be in a hegemonic position with the other living languages. The study is based on getting benefit from human experiences and joint work in the field of teaching Arabic to non-Arabic speakers to mee

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Chem Tech Research
Synthesis of New Selective Electrodes for the Determination of Metronidazole Benzoate (MNZB) Based on a Molecularly Imprinted Polymer Combined With Poly Vinyl Chloride
...Show More Authors

Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Preventive measures for banking supervision on money laundering (Search in the Gulf Commercial Bank)
...Show More Authors

The research aims to study and assess the effectiveness of preventive measures banking for the reduction of money laundering based on the checklist (Check list), which have been prepared based on the paragraphs of some of the principles and recommendations of international and Money Laundering Act No. 93 of 2004 and the instructions thereto, to examine and assess the application of these measures by Gulf Commercial Bank, which was chosen to perform the search.

I've been a statement the concept of money laundering in terms of the definition and characteristics, stages and effects of political, economic and social as well as the nature of banking supervision in terms of the definition and the most important

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
N – Topological Space and Its Applications in Artificial Neural Networks
...Show More Authors

   In this paper we give definitions, properties and examples of the notion of  type Ntopological space. Throughout this paper  N is a finite positive  number, N 2. The task of this paper is to study and investigate some properties of such spaces with the existence of a relation between this space and artificial Neural Networks (NN'S), that is we applied the definition of this space in computer field and specially in parallel processing

View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref