Preferred Language
Articles
/
ijs-4280
Telecom Churn Prediction based on Deep Learning Approach
...Show More Authors

      The transition of customers from one telecom operator to another has a direct impact on the company's growth and revenue. Traditional classification algorithms fail to predict churn effectively. This research introduces a deep learning model for predicting customers planning to leave to another operator. The model works on a high-dimensional large-scale data set. The performance of the model was measured against other classification algorithms, such as Gaussian NB, Random Forrest, and Decision Tree in predicting churn. The evaluation was performed based on accuracy, precision, recall, F-measure, Area Under Curve (AUC), and Receiver Operating Characteristic (ROC) Curve. The proposed deep learning model performs better than other prediction models and achieves a high accuracy rate of 91%. Furthermore, it was noticed that the deep learning model outperforms a small size Neural Network for the customer churn prediction.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 28 2024
Journal Name
Journal Of Advances In Information Technology
Enhancement of Recommendation Engine Technique for Bug System Fixes
...Show More Authors

This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Enhancing the Accuracy of Health Care Internet of Medical Things in Real Time using CNNets
...Show More Authors

     This paper presents an efficient system using a deep learning algorithm that recognizes daily activities and investigates the worst falling cases to save elders during daily life. This system is a physical activity recognition system based on the Internet of Medical Things (IoMT) and uses convolutional neural networks (CNNets) that learn features and classifiers automatically. The test data include the elderly who live alone. The performance of CNNets is compared against that of state-of-the-art methods, such as activity windowing, fixed sample windowing, time-weighted windowing, mutual information windowing, dynamic windowing, fixed time windowing, sequence prediction algorithm, and conditional random fields. Th

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Materials Science Forum
The Effect of Gamma Radiation on the Manufactured HgBa<sub>2</sub>Ca<sub>2</sub>Cu<sub>2.4</sub>Ag<sub>0.6</sub>O<sub>8+δ</sub> Compound
...Show More Authors

In this article four samples of HgBa2Ca2Cu2.4Ag0.6O8+δ were prepared and irradiated with different doses of gamma radiation 6, 8 and 10 Mrad. The effects of gamma irradiation on structure of HgBa2Ca2Cu2.4Ag0.6O8+δ samples were characterized using X-ray diffraction. It was concluded that there effect on structure by gamma irradiation. Scherrer, crystallization, and Williamson equations were applied based on the X-ray diffraction diagram and for all gamma doses, to calculate crystal size, strain, and degree of crystallinity. I

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
Effect of levels in Dual Tree Complex Wavelet Transform when design Universal image stego-analytic
...Show More Authors

Universal image stego-analytic has become an important issue due to the natural images features curse of dimensionality. Deep neural networks, especially deep convolution networks, have been widely used for the problem of universal image stegoanalytic design. This paper describes the effect of selecting suitable value for number of levels during image pre-processing with Dual Tree Complex Wavelet Transform. This value may significantly affect the detection accuracy which is obtained to evaluate the performance of the proposed system. The proposed system is evaluated using three content-adaptive methods, named Highly Undetetable steGO (HUGO), Wavelet Obtained Weights (WOW) and UNIversal WAvelet Relative Distortion (UNIWARD).
The obtain

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement of Generative Adversarial Networks to Generate Digital Color Images of Skin Diseases
...Show More Authors

     The main task of creating new digital images of different skin diseases is to increase the resolution of the specific textures and colors of each skin disease. In this paper, the performance of generative adversarial networks has been optimized to generate multicolor and histological color digital images of a variety of skin diseases (melanoma, birthmarks, and basal cell carcinomas). Two architectures for generative adversarial networks were built using two models: the first is a model for generating new images of dermatology through training processes, and the second is a discrimination model whose main task is to identify the generated digital images as either real or fake. The gray wolf swarm algorithm and the whale swarm alg

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Arabic Cyberbullying Detection Using Support Vector Machine with Cuckoo Search
...Show More Authors

      Cyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer

... Show More
View Publication Preview PDF
Scopus Crossref