Preferred Language
Articles
/
bsj-7403
A New Model Design for Combating COVID -19 Pandemic Based on SVM and CNN Approaches
...Show More Authors

       In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from      Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial lung CT-scans into two groups (COVID-19 and NonCOVID-19) had been proposed. A dataset used is 960 slices of CT scan collected from Iraqi patients /Ibn Al-Nafis teaching hospital. The performance metrics are used in this study (accuracy, recall, precision, and F1 scores). The results indicate that the proposed approach generated a high-quality model for the collected dataset, with an overall accuracy of 98.95% and an overall recall of 97 %.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 15 2022
Journal Name
Revis Bionatura
ND2 Gene Sequencing of Sub fertile Patients Recovered from COVID-19 in Association with Toxoplasmosis
...Show More Authors

A total of (90) blood samples were collected from male patients infected with Toxoplasmosis who recovered from COVID- 19 and attended Kamal Alsamiraai Hospital from 15 January to 15 September 2021. We measured anti-Toxoplasma antibodies (IgG and IgM) detected by ELISA, whereas Anti-COVID-19 antibodies (IgG and IgM) were estimated using Elisa and Afilias. The semen characteristics were also studied among fertile, healthy individuals (control group) and sub-fertile patients. Results showed that the mean sperm count was high among the control group (40.5±1.3x 106/ml) compared with that of the sub-fertile patients (10.3±1.75 and 8.8±1.9 x 106/ml for oligozoospermia, and oligoasthenozoospermia respectively), and it was the highest (44.7±1.4

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The use of the Biz method and classical methods in estimating the parameters of the binary logistic regression model
...Show More Authors

Abstract

          Binary logistic regression model used in data classification and it is the strongest most flexible tool in study cases variable response binary when compared to linear regression. In this research, some classic methods were used to estimate parameters binary logistic regression model, included the maximum likelihood method, minimum chi-square method, weighted least squares, with bayes estimation , to choose the best method of estimation by default values to estimate parameters according two different models of general linear regression models ,and different s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 05 2025
Journal Name
Al–bahith Al–a'alami
New Methods and Old Issues: Theoretical and Methodological Approaches to Social Network Sites in the Arab Region
...Show More Authors

This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 08 2021
Journal Name
J. Inf. Hiding Multim. Signal Process.
Predication of Most Significant Features in Medical Image by Utilized CNN and Heatmap.
...Show More Authors

The growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co

... Show More
View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Thu Jul 21 2022
Journal Name
Al-academy
المضامين الفكرية في تصميم الطوابع العراقية
...Show More Authors

تعد الطوابع احدى وسائل الاتصال المهمة في المجتمع لما تتميز به من مستوى في القيمة الفنية والفكرية، فضلاً عن كونها وسيلة من وسائل الخطاب الاعلامي وذلك لتعدد وظائفها التي من ابرزها:التوثيق لمرحلة معينة وحدث ما.التداولية الرسمية للمراسلات المحلية والعالمية.الاعلانية كونها تعطي انطباعاً عن مراحل التطور والتقدم الاجتماعي والحضاري والسياسي للمجتمع.الدعائية لما تتضمنه من مفاهيم وأفكار وتوجهات سياسية واقتصادية

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2004
Journal Name
Al-academy
تصميم حرف طباعي وفق النسبة الذهبي
...Show More Authors

تصميم حرف طباعي وفق النسبة الذهبي

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (19)
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref