Preferred Language
Articles
/
nBewlpIBVTCNdQwCm7hJ
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained were 96.5% and 93.47%, respectively, before applying balancing to the data. In addition, 98.59% and 97.18%, respectively, after applying the balancing technique The extreme gradient boosting (XGBoost) technique had been applied to selecting the important features and the Pearson correlation for finding the correlation between features.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reduction of Aromatic Content from Hexane by Silica Gel
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Dec 19 2024
Journal Name
Al-rafidain J Med Sci
Assessment of High Risk Pregnant Women by Fetal Echocardiography
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Competitive Adsorption of Three Reactive Dyes by Activated Carbon
...Show More Authors

In this study three reactive dyes (blue B, red R and yellow Y) in single , binary and ternary solution were adsorbed by activated carbon AC in equilibrium and kinetic experiments. Surface area, Bulk and real density, and porosity were carried out for the activated carbon.
Batch Experiments of pH (2.5-8.5) and initial concentration (5-100) mg/l were carried out for single solution for each dye. Experiments of adsorbent dosage effect (0.1-1)g per 100 ml were studied as a variable to evaluate uptake% and adsorption capacity for single dyes(5, 10) ppm, binary and ternary (10) ppm of mixture solutions solution of dyes. Langmuir, and Freundlich, models were used as Equilibrium isotherm models for single solution. Extended Langmuir and Freun

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Removal of Sulfate from Waste Water by Activated Carbon
...Show More Authors

Activated carbon was Produced from coconut shell and was used for removing sulfate from industrial waste water in batch Processes. The influence of various parameter were studied such as pH (4.5 – 9.) , agitation time (0 – 120)min and adsorbent dose (2 – 10) gm.

The Langmuir and frandlich adsorption capacity models were been investigated where showed there are fitting with langmmuir model with squre regression value ( 0.76). The percent of removal of  sulfate (22% - 38%) at (PH=7) in the isotherm experiment increased  with adsorbent mass increasing. The maximum removal value of sulfate at  different pH experiments is (43%) at pH=7.

View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Some Theorems of Fixed Point Approximations By Iteration Processes
...Show More Authors
Abstract<p>The purpose of this paper, is to study different iterations algorithms types three_steps called, new iteration, <italic>M</italic> <sup>∗</sup> −iteration, <italic>k</italic> −iteration, and Noor-iteration, for approximation of fixed points. We show that the new iteration process is faster than the existing leading iteration processes like <italic>M</italic> <sup>∗</sup> −iteration, <italic>k</italic> −iteration, and Noor-iteration process, for like contraction mappings. We support our analytic proof with a numerical example.</p>
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Lead bioremoval by Bacillus spp. Isolated from industrial wastewater
...Show More Authors

Four samples were collected from the wastewater of State Battery Manufacturing Company (SBMC); Babylon 2 factory in AL-Waziriya district, as triplicates. Physical and chemical measurements were carried out such as temperature, pH, Lead concentrations and their ranges were: (19.5-34.5) °C, (6.1-6.4) and (4.5-6.5) mg/L, respectively. Six dominant Bacillus spp. isolates were isolated from these samples; namely, Bacillus subtilis N1, Bacillus subtilis N2, Bacillus subtilis N3, Bacillus cereus N4, Bacillus cereus N5 , Bacillus cereus N6. These isolates were capable of removing Lead from aqueous solutions in a capacity reached 27.6 ± 1.4, 10.1 ± 1.7, 74.5 ± 0.7, 8.93 ± 2.8, 8.1 ± 3.5, 1.6± 0.7 mg/L, respectively. Whereas cell walls,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Corrosion inhibition of Zinc by Imidazol in Acidic Media
...Show More Authors

The inhibitive effect of imidazol on the dissolution of Zn in (1M) HCl has been studied. The inhibion effect of imidazol ,protection efficiency and the corrosion rate of Zn in (1M) HCl were investigated at various concentrations (1x 10-3 – 5x10-3) M and tempearture range (285-328) K. The corrosion inhibitive of Zn by imidazol was studied using weight loss measurement and analytical titration of the amounts of dissolved zinc in acidic solution in presence and absent of imidazol. It was observed that imidazol led to protection efficiency reached to (88.93)% when (10)mM imidazol concentration was used. A linear relationship came true between (C/?) and (C); where (?) is the coverage of Zn surface by imidazol which could be obtained from

... Show More
View Publication Preview PDF
Crossref (1)
Crossref