Keratoconus Severity Detection From Elevation, Topography and Pachymetry Raw Data Using a Machine Learning Approach
...Show More Authors
In this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b
... Show MorePsychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreLongitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreLately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve
... Show MoreAbstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr
... Show MoreIn this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi
... Show MoreBackground: Periodontal diseases are bacterial infections of the gingiva, bone and attachment fibers that support the teeth and hold them in the jaw. Lactoferrin is a multifunctional glycoprotein and it is the main component of neutrophil polymorphonuclear leukocytes that activated during inflammatory processes such as Periodontal diseases Aims of the study: Determine the salivary levels of Lactoferrin and pH and their correlations with clinical periodontal parameters(Plaque Index , Gingival Index , Bleeding on Probing , Probing Pocket Depth , and Clinical Attachment Level ) and the correlation between Lactoferrin with potential of hydrogen ion (PH) ,flow rate and α-amylase of study groups that consisted of patients had gingivitis and pa
... Show MoreIn this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption. No significant effect of initial Cd concentration on the removal efficiency of cadmium b
... Show More