Preferred Language
Articles
/
dhYrrIwBVTCNdQwCyf7N
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and Machine learning algorithm
...Show More Authors

The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communicating with the outside world. This article examines the use of the SVM, k-NN, and decision tree algorithms to classify EEG signals. To minimize the complexity of the data, maximum overlap discrete wavelet transform (MODWT) is used to extract EEG features. The mean inside each window sample is calculated using the Sliding Window Technique. The vector machine (SVM), k-Nearest Neighbor, and optimize decision tree load the feature vectors.

Scopus Crossref
View Publication
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 20 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE EFFECT OF MAXIMUM PHYSICAL EXERTION EXERCISES ACCORDING TO THE ANAEROBIC THRESHOLD ON THE DEVELOPMENT OF EXPLOSIVE ABILITY AND THE SKILL OF SHOOTING BY JUMPING HIGH IN FRONT OF HANDBALL FOR YOUTH
...Show More Authors

The sports field is one of the fields that are concerned with the various methods and methods because of their positive impact on the development of actual training, the investment of the exerted effort in time, and through the follow-up of the researcher in the field and academic field, I noticed that there is a weakness in explosive ability, which affects performance and skill level during training and competition Therefore, the researcher decided to prepare maximum physical exertion exercises according to the anaerobic threshold as a principle of development in many physical and skill variables because good physical performance leads to reaching the best achievements and since the skill of shooting by jumping high - either constitutes a

... Show More
View Publication
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Influence of Cold Plasma on Sesame Paste and the Nano Sesame Paste Based on Co-occurrence Matrix
...Show More Authors

The aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed.  The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the integrative role of the Business Intelligence system and Knowledge Conversion Processes in Building a learning organization A field research in Korek telecom company in Baghdad city
...Show More Authors

Purpose:  The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.

Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Technology Usage in English Language Teaching and Learning: Reality and Dream
...Show More Authors

The aim of the study is to diagnose the real level of technology usage in teaching and learning EFL at university from teachers and students’ viewpoints, and see if it is possible to achieve something of the researchers’ dream - accessing top universities. Two questionnaires have been used to measure the range of technology usage in Colleges of Education for Women, Baghdad and Iraqi Universities, and College of Basic Education. The results have shown that the reality of using technology is still away from the dream. The results have been ascribed to two reasons: The first is the little knowledge of using technology in teaching, and the second is that technology is not included in the curriculum.

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 20 2023
Journal Name
Journal Of Aeronautical Materials
Motor Response Speed And Its Relationship To The Performance Accuracy Of A Skills Of Passing From The Top And Smash Serve In Volleyball
...Show More Authors

The game of volleyball requires the formation of new motor responses, which in turn requires special physical characteristics in the performance of that skill, and the correct and accurate performance during the performance of the skills of passing from the top and smash serve in volleyball cannot be developed or improved without a good level of accuracy and what is required to perform the movements in terms of responses to the defense and attack movements. Therefore, the researchers decided to identify the type of relationship between the motor response speed with the performance accuracy of the skills of passing from the top and the smash serve in volleyball. The research aims to: 1. Identifying the motor response speed of fourth-stage s

... Show More
View Publication
Publication Date
Thu Jun 28 2012
Journal Name
Journal Of Physical Education
The Study of the Motor coincidence and sensitive- Kinetic Perception and its Relation them with Artistic Performance Level in Gymnastics Skills for Women
...Show More Authors

The aim of this study was Identifying the relation of coordination and kinesthetic perception with artistic performance level in gymnastics skills for students in second class from the college of physical education/ university of Baghdad/ Al - jadreia .The searchers have been used the descriptive method in scanning style .The subject of this search has been taken (45) female - student in second class from the college of physical education/ university of Baghdad . The searchers have reached into specific conclusions concerning with statistic analysis about immoral joint relation between sensitive- kinetic coincidence and realization and with Artistic Performance Level in Gymnastics Skills for Women for second class .The an important recommen

... Show More
View Publication Preview PDF