Preferred Language
Articles
/
jperc-91
PROPOSED STANDARDS FOR EVALUATING THE EDUCATIONAL VIDEO ON THE SOCIAL MEDIA
...Show More Authors

In the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational videos to stimulate learner motivation, after reviewing 65 documents related to the field of educational video design and multimedia. The list contained three main fields:  educational, authentication, and technical. The educational field contained the following standards: (Work Title, Goals, Content Presentation, Content Elements, and Motivational Activities). While the authentication field contained the following standards: (Intellectual Rights and Personality Traits). Finally, the technical field contained the following standards: (Shooting Footage, Lighting, Sound, Texts, final product, and Time/Duration).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Employ 6D-BIM Model Features for Buildings Sustainability Assessment
...Show More Authors
Abstract<p>To translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p</p> ... Show More
View Publication
Scopus (15)
Crossref (12)
Scopus Crossref
Publication Date
Mon Sep 12 2016
Journal Name
Revista Pesquisa Em Fisioterapia
YOGA AS A TREATMENT FOR MUSCULOSKELETAL DISCOMFORTS: A HYPOTHESIS
...Show More Authors

Introduction: Nowadays, the prevalence of Musculoskeletal Discomforts (MSD) is increasing in the world. As treatment, usually surgery or physiotherapyare recommended, but they are expensive and may cause side effects. Apracticalcourse of treatment without negative side effects and with permanent positive effects is lacking. Objective: To suggest a practical course of treatment, introduced by a licensed Yoga coach who is experienced in this field, and through thatto shed a light on yoga as treatment for MSD. The hypothesis is that yoga may decrease the pain among individuals with MSD. Methods: This hypothesis is presented based on the practical techniques used in Yoga including body relaxation and breathing awareness (2 minutes & 3 minutes r

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
New Approach for Solving (1+1)-Dimensional Differential Equation
...Show More Authors

View Publication Preview PDF
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Fri Oct 25 2013
Journal Name
International Endodontic Journal
Fabrication and characterization of polymer composites for endodontic use
...Show More Authors

Aim To develop a low-density polyethylene–hydroxyapatite (HA-PE) composite with properties tailored to function as a potential root canal filling material. Methodology Hydroxyapatite and polyethylene mixed with strontium oxide as a radiopacifier were extruded from a single screw extruder fitted with an appropriate die to form fibres. The composition of the composite was optimized with clinical handling and placement in the canal being the prime consideration. The fibres were characterized using infrared spectroscopy (FTIR), and their thermal properties determined using differential scanning calorimetry (DSC). The tensile strength and elastic modulus of the composite fibres and gutta-percha were compared, dry and after 1 month storage in

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Mon Mar 31 2025
Journal Name
Iraqi Statisticians Journal
Hypothesis Testing for Non-Normal Multiple Compact Regression Model
...Show More Authors

Generalized multivariate transmuted Bessel distribution belongs to the family of probability distributions with a symmetric heavy tail. It is considered a mixed continuous probability distribution. It is the result of mixing the multivariate Gaussian mixture distribution with the generalized inverse normal distribution. On this basis, the paper will study a multiple compact regression model when the random error follows a generalized multivariate transmuted Bessel distribution. Assuming that the shape parameters are known, the parameters of the multiple compact regression model will be estimated using the maximum likelihood method and Bayesian approach depending on non-informative prior information. In addition, the Bayes factor was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Block-Iterative Frequency-Domain Equalizations for SC-IDMA Systems
...Show More Authors

In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/

... Show More
View Publication Preview PDF