Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained were 96.5% and 93.47%, respectively, before applying balancing to the data. In addition, 98.59% and 97.18%, respectively, after applying the balancing technique The extreme gradient boosting (XGBoost) technique had been applied to selecting the important features and the Pearson correlation for finding the correlation between features.
Abstract search seeks to clarify the role and the importance of financial and fiscal policy adopted by the Iraqi Government during the years (2015 – 2018) to meet federal public deficit, as the Iraqi economy to shocks from falling global oil prices and terrorist attack ISIS, so the State budget suffered from a severe lack of income as a result of its reliance on revenues from selling crude oil and in return the high proportion of public expenditures. Especially military to counter these attacks that by studying the results of the implementation of budgets and analysis and statement Causes of disabilities and assessment of these policies and procedures imposed by the International Monetary Fund. the research aims to show how increased g
... Show MoreThe research aims to identify intelligence spiritual among a sample of students Baghdad University as well as to identify the differences between students in intelligence spiritual according to variable type (male - female), and variable area of study (Science - a human) and variable (First grade - fourth grade), The research sample consisted of (300) students, were applied scale search - a spiritual Intelligence Scale (prepared by the researcher), has resulted in the search results for: -
The students of the University of Baghdad (sample) enjoyed a high level of spiritual intelligence.
- There are no differences between males and females in the spiritual intelligence.
- There
The current research aims to verify the role of strategic intelligence as an explanatory variable in organizational success as a respondent variable in the colleges of the University of Fallujah, the research community. (Dean, Associate Dean, Section Head, Division Officer, Unit Officer), The researcher used the questionnaire as the main tool to collect data that included (50) items, in addition to using personal interviews and field observations as aids in data collection. The researcher relied on statistical programs (SPSS V.25; Excel V (16) In the treatment and analysis of data through the use of the most appropriate statistical methods (arithmetic mean, standard deviation, difference coefficient, determinatio
... Show MoreThe present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreDue to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.