Preferred Language
Articles
/
bsj-6641
Recurrent Stroke Prediction using Machine Learning Algorithms with Clinical Public Datasets: An Empirical Performance Evaluation
...Show More Authors

Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning algorithms implementation in the recurrent stroke prediction models. This research aims to investigate and compare the performance of machine learning algorithms using recurrent stroke clinical public datasets. In this study, Artificial Neural Network (ANN), Support Vector Machine (SVM) and Bayesian Rule List (BRL) are used and compared their performance in the domain of recurrent stroke prediction model. The result of the empirical experiments shows that ANN scores the highest accuracy at 80.00%, follows by BRL with 75.91% and SVM with 60.45%.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 25 2025
Journal Name
Modern Sport
The Impact of an AI-Supported Smart HIIT Program on Cardiovascular Fitness and Physical Performance
...Show More Authors

View Publication
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Our Dermatology Online
Follicular vitiligo: the present clinical status
...Show More Authors

KE Sharquie, AA Noaimi, Our Dermatology Online, 2016 - Cited by 7

View Publication
Publication Date
Sat Dec 21 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Clinical Complications of Beta-Thalassemia Major
...Show More Authors

Beata thalassemia

Beta thalassemia syndrome by reduction or absence of B-globin chain synthesis. Without iron chelation therapy (ICT) the regular blood transfusion would increase the iron stores to several times. Endocrine glands are vulnerable to iron overload causing endocrine dysfunction.  Iron deposition within the parathyroid gland causes hypoparathyroidism particularly after ten years of age. Pancreatic islets are very susceptible to oxidative damage due to iron overload; their high divalent metal expression makes them highly susceptible to iron-catalyzing oxidative stress. The pathogenicity of osteopathy in  is multifactorial comprising environmental (diet and lifestyle), iatrogenic (medicines), genetic and acqui

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Shear Wave velocity for carbonate rocks
...Show More Authors

In many oil fields only the BHC logs (borehole compensated sonic tool) are available to provide interval transit time (Δtp), the reciprocal of compressional wave velocity VP.

   To calculate the rock elastic or inelastic properties, to detect gas-bearing formations, the shear wave velocity VS is needed. Also VS is useful in fluid identification and matrix mineral identification.

   Because of the lack of wells with shear wave velocity data, so many empirical models have been developed to predict the shear wave velocity from compressional wave velocity. Some are mathematical models others used the multiple regression method and neural network technique.

   In this study a number of em

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Fracture Pressure Gradient in Halfaya Oilfield
...Show More Authors

   Fracture pressure gradient prediction is complementary in well design and it is must be considered in selecting the safe mud weight, cement design, and determine the optimal casing seat to minimize the common drilling problems. The exact fracture pressure gradient value obtained from tests on the well while drilling such as leak-off test, formation integrity test, cement squeeze ... etc.; however, to minimize the total cost of drilling, there are several methods could be used to calculate fracture pressure gradient classified into two groups: the first one depend on Poisson’s ratio of the rocks and the second is fully empirical methods. In this research, the methods selected are Huubert and willis, Cesaroni I, Cesaroni II,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
prediction Capacity of Euphrates River at Assamawa City
...Show More Authors

The reduction in the rivers capacity is one the most important issue to give the decision maker an idea during the flood season. The study area included the rivers of the Al Atshan, Al Sabeel and Euphrates, which are surveyed with a length of 21, 5 and 20 km respectively. The Euphrates , the Atshan and Al Sabeel rivers were simulated by using HEC-RAS 5.0.3 software to study the real condition within the city of Assamawa. As well as the simulation was implemented by modifying the cross sections of the Euphrates and Al Sabeel rivers to increase their capacity to 1300 and 1200 m3/s respectively which are a flood discharges100 year return periods. The results showed that the maximum discharge capacity under real conditions o

... Show More
View Publication Preview PDF
Crossref (4)
Crossref