Preferred Language
Articles
/
ijs-12438
Classification of Cardiac Arrhythmia using ID3 Classifier Based on Wavelet Transform
...Show More Authors

Accurate detection of Electro Cardio Graphic (ECG) features is an important demand for medical purposes, therefore an accurate algorithm is required to detect these features. This paper proposes an approach to classify the cardiac arrhythmia from a normal ECG signal based on wavelet decomposition and ID3 classification algorithm. First, ECG signals are denoised using the Discrete Wavelet Transform (DWT) and the second step is extract the ECG features from the processed signal. Interactive Dichotomizer 3 (ID3) algorithm is applied to classify the different arrhythmias including normal case. Massachusetts Institute of Technology-Beth Israel Hospital (MIT-BIH) Arrhythmia Database is used to evaluate the ID3 algorithm. The experimental result shows that the accuracy of ID3 is 92% in the case of Haar transform and 94% with Daubeshies4 transform.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Image Content Verification based on DWT and Chaotic Map Watermarking
...Show More Authors

     Image content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.

     In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on  ea

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Dual Stages of Speech Enhancement Algorithm Based on Super Gaussian Speech Models
...Show More Authors

Various speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Hybrid vs Ensemble Classification Models for Phishing Websites
...Show More Authors

Phishing is an internet crime achieved by imitating a legitimate website of a host in order to steal confidential information. Many researchers have developed phishing classification models that are limited in real-time and computational efficiency.  This paper presents an ensemble learning model composed of DTree and NBayes, by STACKING method, with DTree as base learner. The aim is to combine the advantages of simplicity and effectiveness of DTree with the lower complexity time of NBayes. The models were integrated and appraised independently for data training and the probabilities of each class were averaged by their accuracy on the trained data through testing process. The present results of the empirical study on phishing websi

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 23 2021
Journal Name
Iraqi Journal Of Science
Noise Reduction, Enhancement and Classification for Sonar Images
...Show More Authors

    Ultrasound imaging has some problems with image properties output. These affects the specialist decision. Ultrasound noise type is the speckle noise which has a grainy pattern depending on the signal. There are two parts of this study. The first part is the enhancing of images with adaptive Weiner, Lee, Gamma and Frost filters with 3x3, 5x5, and 7x7 sliding windows. The evaluated process was achieved using signal to noise ratio (SNR), peak signal to noise ratio (PSNR), mean square error (MSE), and maximum difference (MD) criteria. The second part consists of simulating noise in a standard image (Lina image) by adding different percentage of speckle noise from 0.01 to 0.06. The supervised classification based minimum di

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables
...Show More Authors

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
SOME TYPES OF DELAY DIFFERENTIAL EQUATIONS SOLVED BY SUMUDU TRANSFORM METHOD
...Show More Authors

View Publication
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Land Classification Wadi Al-Salam Basin
...Show More Authors

Dry environment study forms an important part in the field of applies geomorphology for
the wide rang of its lands which form most of the world, homeland, and Iraqi lands specially,
and what these lands include of scientific cases which needs to be searched and investigated.
They include rocks, land shapes, water supplements, its ancient soil and its active diggings are
all signs of the environment changes and effects that these lands under take over time, with
continuous remains of its features of characteristics under geo morphological dry
circumstances which works to slow change average, when the geomorphologic fearers varies
in this environment and what it contain of important economical resource. As to participl

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
The effect of the activation functions on the classification accuracy of satellite image by artificial neural network
...Show More Authors

View Publication
Scopus (17)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (15)
Crossref (9)
Scopus Crossref