Preferred Language
Articles
/
uBdSPo4BVTCNdQwCZD6V
Comparative Study of Anemia Classification Algorithms for International and Newly CBC Datasets

Data generated from modern applications and the internet in healthcare is extensive and rapidly expanding. Therefore, one of the significant success factors for any application is understanding and extracting meaningful information using digital analytics tools. These tools will positively impact the application's performance and handle the challenges that can be faced to create highly consistent, logical, and information-rich summaries. This paper contains three main objectives: First, it provides several analytics methodologies that help to analyze datasets and extract useful information from them as preprocessing steps in any classification model to determine the dataset characteristics. Also, this paper provides a comparative study of several classification algorithms by testing 12 different classifiers using two international datasets to provide an accurate indicator of their efficiency and the future possibility of combining efficient algorithms to achieve better results. Finally, building several CBC datasets for the first time in Iraq helps to detect blood diseases from different hospitals. The outcome of the analysis step is used to help researchers to select the best system structure according to the characteristics of each dataset for more organized and thorough results. Also, according to the test results, four algorithms achieved the best accuracy (Logitboost, Random Forest, XGBoost, Multilayer Perceptron). Then use the Logitboost algorithm that achieved the best accuracy to classify these new datasets. In addition, as future directions, this paper helps to investigate the possibility of combining the algorithms to utilize benefits and overcome their disadvantages.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
Crossref (14)
Crossref
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Accounting Disclosure for non-current intangible assets according to international accounting standard (IAS16, 36): A Comparative Study of the State Company for Travelers and delegates Transportations

The Accounting Disclosure for non-current intangible assets is necessary to rely on accounting information by decision makers in the economic unity, two international accounting standards issued (IAS16,36), which aims to provide the foundations of the recognition, measurement and disclosure of appropriate assets Non-current tangible. (IAS16) allowed to use re-evaluation approach to measure assets entrance due to the inadequacy of the accounting information resulting from the application of the historical cost of the entrance under increasing technical developments and continuing that leave clear their effects on non-current intangible assets, As well as the requirements of what came (IAS36) the importance of accounting for the impairment

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The importance of drafting Arab accounting standards Comparative study in light of international accounting compliance and different environmental factors

Importance of accounting standards belong to be the instructor and the advisor for accountant in performing his work . For each invironment a group of political, social, economical  and cultural factors which distinguish it about other environments . In  order to perform its aim in produsing accouting information helps in making decisions on different levels, accounting standards should established in a form that harmonized with the environment that apply in it . Establishing international accounting standards comes with the same direction and then it has put influential with standards some states that have influence on international accounting standards committee. So because of the big changes that happened in the inte

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Oct 31 2018
Journal Name
Iraqi Journal Of Science
Search Result Enhancement For Arabic Datasets Using Modified Chicken Swarm

The need for information web-searching is needed by many users nowadays. They use the search engines to input their query or question and wait for the answer or best search results. As results to user query the search engines many times may be return irrelevant pages or not related to information need. This paper presents   a proposed model to provide the user with efficient and effective result through search engine, based on modified chicken swarm algorithm  and cosine similarity    to eliminate and delete irrelevant pages(outliers) from the ranked list results, and to improve the results of the user's query   . The proposed model is applied to Arabic dataset and use the ZAD corpus dataset for 27

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Journal Of Legal Sciences
The child right of body protection in the international law A comparative study in Islamic shree

The children are suffering from many kinds of tragedy acts such as killing and torture which arise from civil wars never be seen along the human history since decades.

We still see millions of children suffering specially in the Arab world, Iraq, Syria, Libya, and Yemen. This study deals with kinds of protections which comes by international treaties and practiced by international organizations which helps in the protection through the military conflicts, and we compare this right in the Islamic shree, and how the states are comply with this right and how can they protect the children practically.

At last we reach the conclusion and finally the recommendations.   

Crossref
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Clinico – Hemato and Biochemical Study of Anemia in Cachectic Cattle in Baghdad

The study was carried out in order to evaluate clinically and laboratory cachectic animals suffering from anemia. Animal examined were 50 cow and calf. The study include clinical, hemato and biochemical test for accurate diagnosis of cachexia in cows and calves . Blood smears were conducted for detection of blood parasites , fecal examination for gastrointestinal parasites and Different parameters were applied for classification of cachexia , depending on bony projection specially ribs and pelvic and generalized muscular atrophy. However , The study revealed an incidence of cachexia and anemia of blood parasites was including Theileria, Anaplasma, gastrointestinal parasites, ten cases were shown foreign body syndrome while other tens wer

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Teaching skills for Public and Private Schools’ Teachers: comparative study : Teaching skills for Public and Private Schools’ Teachers: comparative study

Abstract:

The great expansion of teaching skills requires finding ways and methods to help teachers acquire experiences of all kinds. The researcher found in the subject of the teaching skills for teachers in public and private schools a fertile field for conducting a study that enables the measurement of these skills. Thus, the study aims to identify the skills of teaching lessons for teachers, the difference in teaching lesson skills for teachers according to the years of service, the differences in teaching lesson skills for teachers according to the specialized teachers and non-specialized teachers, the differences in teaching lesson skills for teachers according to the public and private school. The

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Proposal Hybrid CBC Encryption System to Protect E-mail Messages

Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF