Medical images play a crucial role in the classification of various diseases and conditions. One of the imaging modalities is X-rays which provide valuable visual information that helps in the identification and characterization of various medical conditions. Chest radiograph (CXR) images have long been used to examine and monitor numerous lung disorders, such as tuberculosis, pneumonia, atelectasis, and hernia. COVID-19 detection can be accomplished using CXR images as well. COVID-19, a virus that causes infections in the lungs and the airways of the upper respiratory tract, was first discovered in 2019 in Wuhan Province, China, and has since been thought to cause substantial airway damage, badly impacting the lungs of affected persons. The virus was swiftly gone viral around the world and a lot of fatalities and cases growing were recorded on a daily basis. CXR can be used to monitor the effects of COVID-19 on lung tissue. This study examines a comparison analysis of k-nearest neighbors (KNN), Extreme Gradient Boosting (XGboost), and Support-Vector Machine (SVM) are some classification approaches for feature selection in this domain using The Moth-Flame Optimization algorithm (MFO), The Grey Wolf Optimizer algorithm (GWO), and The Glowworm Swarm Optimization algorithm (GSO). For this study, researchers employed a data set consisting of two sets as follows: 9,544 2D X-ray images, which were classified into two sets utilizing validated tests: 5,500 images of healthy lungs and 4,044 images of lungs with COVID-19. The second set includes 800 images, 400 of healthy lungs and 400 of lungs affected with COVID-19. Each image has been resized to 200x200 pixels. Precision, recall, and the F1-score were among the quantitative evaluation criteria used in this study.
The aim for this research is to investigate the effect of inclusion of crack incidence into the 2D numerical model of the masonry units and bonding mortar on the behavior of unreinforced masonry walls supporting a loaded reinforced concrete slab. The finite element method was implemented for the modeling and analysis of unreinforced masonry walls. In this paper, ABAQUS, FE software with implicit solver was used to model and analyze unreinforced masonry walls which are subjected to a vertical load. Detailed Micro Modeling technique was used to model the masonry units, mortar and unit-mortar interface separately. It was found that considering potential pure tensional cracks located vertically in the middle of the mortar and units show
... Show MoreSeismic facies analysis constrained with well log information have been used to predict lithofacies distribution across the Okam Field of Niger Delta. Density and gamma ray logs were cross-plotted and the seismic section was subdivided vertically into different seismic facies. The delineated lithologies, from well logs were correlated with seismic facies signatures using lines of intersection across the wells. Gamma ray and resistivity logs were used to identify the interfaces between the lithofacies and correlated across the field. Structural interpretation was carried out. Time slices were generated and examined at different intervals within the identified reservoirs. Stratigraphic related attribute and envelope were extracted on these
... Show MoreThe agricultural sector suffers from many risks and natural disasters, such as droughts and heavy rains that cause floods, as well as hail and agricultural pests, etc., that threaten agricultural activity and reduce it, which leads to the failure of farmers and peasants for fear of being subjected to continuous losses. Nevertheless, we notice almost complete reluctance to move towards agricultural insurance, due to the dependence of farmers on the government, which adopts the principle of compensation instead of agricultural insurance when natural disasters happen despite the difficulties and financial hardship as well as the suspicion of corruption that haunt the compensation process and this represents the most important problem for resea
... Show MoreThe Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.
This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin
... Show MoreSewage water is a mixture of water and solids added to water for various uses, so it needs to be treated to meet local or global standards for environmentally friendly waste production. The present study aimed to analyze the new Maaymyrh sewage treatment plant's quality parameters statistically at Hilla city. The plant is designed to serve 500,000 populations, and it is operating on a biological treatment method (Activated Sludge Process) with an average wastewater inflow of 107,000m3/day. Wastewater data were collected daily by the Mayoralty of Hilla from November 2019 to June 2020 from the influent and effluent in the (STP) new in Maaymyrh for five water quality standards, such as (BOD5), (COD), (TSS), (TP)
... Show MoreThe theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreAccurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show MoreThis research began by explaining its variables and dimensions especially the digital gap, which the authors explained it elaborately beginning with the concept, the reasons blind its emergence of its measurement, and how to treat it. The authors supposed the potentiality of relying on enforcing knowledge in general and the groups suffer from this gap in particular, especially the targeted knowledge to treat its subject.
As enforcing knowledge usually depends on some strategies or choices of organizational orientation among them is learning and training from one side, and communication, as an indicating factor for organizational effectiveness as the authors refer from the other side.
Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char
... Show More