Preferred Language
Articles
/
bsj-9711
Exploring Important Factors in Predicting Heart Disease Based on Ensemble- Extra Feature Selection Approach
...Show More Authors

Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficacy of several classification algorithms on four reputable datasets, using both the full features set and the reduced features subset selected through the proposed method. The results show that the feature selection technique achieves outstanding classification accuracy, precision, and recall, with an impressive 97% accuracy when used with the Extra Tree classifier algorithm. The research reveals the promising potential of the feature selection method for improving classifier accuracy by focusing on the most informative features and simultaneously decreasing computational burden.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
On Semigroup Ideals and Right n-Derivation in 3-Prime Near-Rings
...Show More Authors

 The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تحليل العوامل المؤثرة في اداء سوق الاوراق المالية(مصر حالة دراسية)
...Show More Authors

تشكل سوق الاوراق المالية ركناً اساسياً من اركان هيكل النظام التمويلي في النظم الاقتصادية المعاصرة، لما تقوم به هذه الاسواق من دور مهم في حشد المدخرات المحلية وتوجيهها في قنوات استثمارية تعمل على دعم الاقتصاد القومي وتزيد من معدلات الرفاهية الاقتصادية لافراده، فضلاً عن كونها مرأة للوضع الاقتصادي العام في البلاد.

ونتيجة للروابط القوية بين سوق الاوراق المالية والاقتصاد، عُدّ استقرار ونمو

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 05 2020
Journal Name
Al-kindy College Medical Journal
Prevalence of Oral Manifestations of Inflammatory Bowel Disease in Patients Admitted to Sulaymaniyah teaching hospital – Iraq
...Show More Authors

The aim of this study is to evaluate the association between IBD and oral symptom and mucosal lesions in patients with Crohn’s disease and ulcerative colitis

Methods: This is a cross-sectional study that has been done in (Kurdistan center for Gastroenterology and hepatology) of Teaching Hospital in Sulaymaniyah-Iraq, which included 101 patients previously diagnosed with Inflammatory Bowel Disease who were interviewed regarding manifestations of inflammatory bowel disease especially oral manifestations. Required data were collected through a specially designed questionnaire,

Results: The patients’ mean age was 45.74±12.58 years. Patients with ulcerative colitis and Crohn’s disease w

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Oct 24 2018
Journal Name
Journal Of Economics And Administrative Sciences
Factors Strategic Choice and Impact at Quality of Higher Education
...Show More Authors

This research raised the strategic selection factors and dimensions of the quality of higher education and what the nature of their relationship and has been collecting a sample search from the technological University of president scientific departments and administrative and scientific associates and chiefs of branches This research aims at studying factors affecting the strategic selection effects these factors in the quality of higher education and the combination of these factors has been identified as a group of selected dimensions of quality of higher education and study link relationships and affecting factors and strategic selection of (risk, previous strategies, resources, time, considerations and internal trends) and d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Studies In Humanities And Educational Sciences
Unlocking the Language of the Heart: A Stylistic Analysis of EmotiveTechniques in Paulo Coelho's By the River Piedra I Sat Down and Wept
...Show More Authors

This paper presents an in-depth stylistic analysis of the linguistic artistry andliterary techniques employed by Paulo Coelho in his novel By the River Piedra ISat Down and Wept. A close reading approach guided by stylistics and linguisticsframeworks reveals Coelho's extensive incorporation of imaginative metaphors,vivid imagery, poetic diction, and resonant symbols across the narrative. Analysisspecifically elucidates how Coelho adeptly manipulates various stylistic features toconvey thematic content, shape characterization, and produce aesthetic impacts.Findings provide critical insights into Coelho’s linguistic mastery and contribute toresearch in stylistics and literary linguistics through rigorous examination of anentire contemporary

... Show More
View Publication
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Development of Spatial Data Infrastructure based on Free Data Integration
...Show More Authors

In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho

... Show More
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref