Preferred Language
Articles
/
bsj-9711
Exploring Important Factors in Predicting Heart Disease Based on Ensemble- Extra Feature Selection Approach
...Show More Authors

Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficacy of several classification algorithms on four reputable datasets, using both the full features set and the reduced features subset selected through the proposed method. The results show that the feature selection technique achieves outstanding classification accuracy, precision, and recall, with an impressive 97% accuracy when used with the Extra Tree classifier algorithm. The research reveals the promising potential of the feature selection method for improving classifier accuracy by focusing on the most informative features and simultaneously decreasing computational burden.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 07 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Instructional Program Concerning premarital screening of sexual transmitted disease on Student's Knowledge at Baghdad University
...Show More Authors

Objectives: To identify the effectiveness of instructional program concerning premarital screening of sexual transmitted disease on student's knowledge at Baghdad University and examine the relationship between students' knowledge and certain studied variables. And hypothesis for this study; There is a difference in university student’s knowledge toward premarital screening between pre and posttests of instructional program. Methodology: A quasi-experimental design (pretest-posttest approach) was conducted at six colleges and its college of education ibn rushd, college of political science, college of law, college of literatur

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Measuring the Change in the Impact of the Corona Pandemic Factors on Psychological Sensitivity and Covid-19 Phobia in a Sample of University Students
...Show More Authors

The aim of the research is to measure the change in the impact of the factors of the Corona pandemic on psychological sensitivity and COVID-19 phobia in a sample of Bisha University students and to detect the differences in the phobia (phobia) Covid-19 among the sample members in the measurement before the ban and after the ban was opened, in addition to the differences in psychological sensitivity of  The sample has between sizes before and after the spread of the Corona pandemic, as well as the differences in them according to the gender variable (male, female). The researcher relied on the comparative approach. The scale of psychological sensitivity and COVID-19 phobia was applied to a sample of (62) male and female respondents.

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The use of value chain analysis of information in determining the most important the accounting information
...Show More Authors

The use  analysis  value chain such  information in the provision as financial  so information quality meet and satisfy the needs of users such information , particularly investors and lenders   as the identification needs   financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances   theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Selection of highly ethanol productive yeast
...Show More Authors

Seventy five isolates of Saccharomyces cerevisiae were identified, they were isolated from different local sources which included decayed fruits and vegetables, vinegar, fermented pasta, baker yeast and an alcohol factory. Identification of isolates was carried out by cultural microscopical and biochemical tests. Ethanol sensitivity of the isolates showed that the minimal inhibitory concentration of the isolate (Sy18) was 16% and Lethal concentration was 17%. The isolate (Sy18) was most efficient as ethanol producer 9.36% (v/w). The ideal conditions to produce ethanol from Date syrup by yeast isolate, were evaluated, various temperatures, pH, Brix, incubation period and different levels of (NH4)2HP04. Maximum ethanol produced was 10

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program Based on Connectivism Theory in Developing E-Learning Competencies among Teachers of Islamic Education in Dhofar Governorate
...Show More Authors

Abstract

The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2006
Journal Name
Journal Of Educational And Psychological Researches
اثر لعبة كرة القلب في خفض غضب أطفال الروضة
...Show More Authors

مشكلة البحث واهميته :

            يعد الغضب من المظاهر الانفعالية الشائعة في مرحلة الطفولة المبكرة وذلك بسبب كثرة المواقف المثيرة لغضب الطفل في هذه المرحلة ، كما ان الطفل في هذه المرحلة سرعان ما يكتفي في كثير من الاحيان بان غضبه وبكائه طريقة سهلة للوصول الى ما يريد . ويعد المختصون في هذا المجال ، بان نوبات غضب الاطفال ، هي شيء عام طبيعي عند جميع الاطفال ، لكن عندما تكون نوبات عنيفة

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref