Preferred Language
Articles
/
ijs-8379
COVID-19 Detection via Blood Tests using an Automated Machine Learning Tool (Auto-Sklearn)
...Show More Authors

     Widespread COVID-19 infections have sparked global attempts to contain the virus and eradicate it. Most researchers utilize machine learning (ML) algorithms to predict this virus. However, researchers face challenges, such as selecting the appropriate parameters and the best algorithm to achieve an accurate prediction. Therefore, an expert data scientist is needed. To overcome the need for data scientists and because some researchers have limited professionalism in data analysis, this study concerns developing a COVID-19 detection system using automated ML (AutoML) tools to detect infected patients. A blood test dataset that has 111 variables and 5644 cases was used. The model is built with three experiments using Python's Auto-Sklearn tool. First, an analysis of the Auto-Sklearn process is done by studying the impact of several learning settings and parameters on the COVID-19 dataset using different classification methods, namely meta-learning, ensemble learning, and a combination of ensemble learning and meta-learning. The results show that using Auto-Sklearn with a meta-learning and ensemble learning parameter model predicts the patients infected with COVID-19 with high accuracy, reaching 96%. Furthermore, the best algorithm selected is the Random Forest Classifier (RF), which outperforms other classification methods. Finally, AutoML can assist those new to data sciences or programming skills in selecting the appropriate algorithm and hyperparameters and reducing the number of steps required to achieve the best results.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Sport Sciences
The effect of using the McCarthy model according to cognitive style (rigid- flexibility) in learning some skills in artistic gymnastics for women
...Show More Authors

The aim of the research is to identify the cognitive method (rigidity flexibility) of third-stage students in the collage of Physical Education and Sports Sciences at The University of Baghdad, as well as to recognize the impact of using the McCarthy model in learning some of skills in gymnastics, as well as to identify the best groups in learning skills, the experimental curriculum was used to design equal groups with pre test and post test and the research community was identified by third-stage students in academic year (2020-2021), the subject was randomly selected two divisions after which the measure of cognitive method was distributed to the sample, so the subject (32) students were distributed in four groups, and which the pre te

... Show More
Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Restoration of Digital Images Using an Iterative Filter Algorithm
...Show More Authors

Digital image started to including in various fields like, physics science, computer science, engineering science, chemistry science, biology science and medication science, to get from it some important information. But any images acquired by optical or electronic means is likely to be degraded by the sensing environment. In this paper, we will study and derive Iterative Tikhonov-Miller filter and Wiener filter by using criterion function. Then use the filters to restore the degraded image and show the Iterative Tikhonov-Miller filter has better performance when increasing the number of iteration To a certain limit then, the performs will be decrease. The performance of Iterative Tikhonov-Miller filter has better performance for less de

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed Dec 31 2008
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bio Chemical Study of Antithyroid Peroxidase Auto Antibodies , Magnesium and Cobalt in Hyperthyroidism Patients From Different Regions of Iraq.
...Show More Authors

Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bio Chemical Study of Antithyroid Peroxidase Auto Antibodies , Magnesium and Cobalt in Hyperthyroidism Patients From Different Regions of Iraq.
...Show More Authors

Sixty hyperthyroidism patients aged (20-45) years from different parts of Iraq , (20) from the North , (20) from Baghdad , (20) from the South of Iraq , and (20)control were tested for the presence of antithyroid peroxidase antibody(Tpo-Ab)and for Mg and Co levels in their sera.

 

The results revealed a significant increase in (Tpo-Ab) in all patients group from the different parts of Iraq compared to control , also a  significant increase in (Tpo-Ab) for  the group from  North compared to other parts.

 

A significant decrease in Mg and Co levels in sera of patients from all parts of Iraq compared to control values , while no significant differences among patient groups were notice

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
BLOOD PARASITES OF TWO BEE-EATERS iN IRAQ
...Show More Authors

Examination of 241 specimens of two bee-eater species, Merops apiaster and Merops
superciliosus persicus reveal recording of Haemoproteus meropis (Zagar, 1945) emend.
Bennett, 1978 and H. manwelli Bennett, 1978 for the first time in Iraq. A new species
Haemoproteus hudaidensis sp. nov. is described. Microfilariae are also infected the two host
species. The results are discussed with the pertinent literature and the necessary comparision
of morphometric measurements of the recorded parasites with that previously reported is
provided along with a taxonomic key including the newly described haemoproteid.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparations of Organoclay Using Cationic Surfactant and Characterization of PVC/ (Bentonite and Organoclay) Composite Prepared via Melt Blending Method
...Show More Authors

Calcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively.  The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the

... Show More
View Publication Preview PDF