Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from a questionnaire, and the psychiatric researchers recommend these questions. Useless questions are pruned using the attribute selection method. Moreover, pieces of information gained through these questions are measured according to a specific class and ranked accordingly. Association and a priori algorithms are used to detect the most influential and interrelated questions in the questionnaire. Consequently, the decisive parameters that may lead to job apathy are determined.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreFeature selection, a method of dimensionality reduction, is nothing but collecting a range of appropriate feature subsets from the total number of features. In this paper, a point by point explanation review about the feature selection in this segment preferred affairs and its appraisal techniques are discussed. I will initiate my conversation with a straightforward approach so that we consider taking care of features and preferred issues depending upon meta-heuristic strategy. These techniques help in obtaining the best highlight subsets. Thereafter, this paper discusses some system models that drive naturally from the environment are discussed and calculations are performed so that we can take care of the prefe
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreOver the last period, social media achieved a widespread use worldwide where the statistics indicate that more than three billion people are on social media, leading to large quantities of data online. To analyze these large quantities of data, a special classification method known as sentiment analysis, is used. This paper presents a new sentiment analysis system based on machine learning techniques, which aims to create a process to extract the polarity from social media texts. By using machine learning techniques, sentiment analysis achieved a great success around the world. This paper investigates this topic and proposes a sentiment analysis system built on Bayesian Rough Decision Tree (BRDT) algorithm. The experimental results show
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreThe Al Mishraq site has been the subject of many scientific studies for the period before and
after the fire in 2003. Five visits to the site were conducted twice in 2003 for general fact-finding, twice
in 2004, and once in 2005 for detailed sampling and monitoring. Desk-based research and laboratory analysis of soil and water samples results indicate that surface water and groundwater pollution from Al Mishraq site was significant at the time of its operation. The primary pollution source was the superheated water injection process, while the principal receptor is the River Tigris. Now that the plant is idle, this source is absent. Following the June 2003 sulphur fire, initial investigations indicate that short damage to
vegeta
Facial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f
... Show MoreActivities associated with mining of uranium have generated significant quantities of waste materials containing uranium and other toxic metals. A qualitative and quantitative study was performed to assess the situation of nuclear pollution resulting from waste of drilling and exploration left on the surface layer of soil surrounding the abandoned uranium mine hole located in the southern of Najaf province in Iraq state. To measure the specific activity, twenty five surface soil samples were collected, prepared and analyzed by using gamma- ray spectrometer based on high counting efficiency NaI(Tl) scintillation detector. The results showed that the specific activities in Bq/kg are 37.31 to 1112.47 with mean of 268.16, 0.28 to 18.57 with
... Show MoreThe research is an attempt to investigate experimentally the influence of teacher’s errors correction and students’ errors correction on teaching English at the College of Physical Education for Women. Errors are seen as a natural way for developing any language but teachers are puzzled the way they can correct these errors. So, this research gives some idea of using two types of errors correction. The sample of the research is female students of the first year stage at the College of Physical Education for Women of the academic year 2009-2010. The whole population of the research is (94) students while the sample is (64). Thus, the sample represents 68% from the population of the research. The sample represents It is hypothesized th
... Show MoreIodine-131 has become an essential radionuclide used in nuclear medicine for clinical and research purposes. The increase use of this radionuclide in medicine for diagnostic and treatment of thyroid diseases creates a demand to obtain a feasible methodology for occupational or accidental monitoring of internal contamination. In this study, two techniques were employed to find an appropriate one of in vivo bioassay for evaluating Iodine-131 body content. A scanning Whole Body Counter (WBC) equipped with 6NaI (Tl) scintillation detector, an anthropomorphic phantom and point source were used. The results showed that the counter sensitivity, as a first approach (conventional method), had a logarithmic and significant correlation w
... Show More