Preferred Language
Articles
/
bsj-8564
Detection of Autism Spectrum Disorder Using A 1-Dimensional Convolutional Neural Network
...Show More Authors

Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D CNNs have shown improved accuracy in the classification of ASD compared to traditional machine learning algorithms, on all these datasets with higher accuracy of 99.45%, 98.66%, and 90% for Autistic Spectrum Disorder Screening in Data for Adults, Children, and Adolescents respectively as they are better suited for the analysis of time series data commonly used in the diagnosis of this disorder

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Advances In Information Technology
Towards Accurate SDG Research Categorization: A Hybrid Deep Learning Approach Using Scopus Metadata
...Show More Authors

The complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effect of the think, pair, and share strategy of using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women
...Show More Authors

The research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects

... Show More
View Publication Preview PDF
Publication Date
Wed May 18 2016
Journal Name
Al-academy
Aesthetic dimension to the formation of postmodern: إيهاب احمد عبد الرضا
...Show More Authors

Find taught dimension aesthetic in the formation of post-modernism, which is one of the themes of aesthetics in the stream of postmodernism, is problematic because of the lack of provisions and fixed values reinforce the concept of beauty, and put done technical plastic in the circle of evaluation and judgment aesthetic, this research as an attempt to reveal the aesthetic concepts that can be drawn from artistic experiments in the formation of post-modernism, through the development of those concepts viable mainstream.
Search contains four chapters: the first chapter includes a general approach to the research, has been showcasing the research problem and the importance of research and goal of Search: detection dimension aesthetic in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Basic Education
Synthesis, spectroscopic and biological studies of some lanthanide (ш) nitrate complexes with 1, 1--bis (orthoamino phenyl thio) - methane.
...Show More Authors

Publication Date
Sun Jan 01 2017
Journal Name
Al-mustansiriyah
Synthesis, Spectroscopic and Biological Studies of a New Some Complexes with N-Pyridin-2-Ylmethyl-Benzene-1, 2Diamine
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Iranian Journal Of Earth Sciences
Resistivity surveys application for detection of shallow caves in a case example from Western Iraq
...Show More Authors

Scopus (2)
Scopus