Correct grading of apple slices can help ensure quality and improve the marketability of the final product, which can impact the overall development of the apple slice industry post-harvest. The study intends to employ the convolutional neural network (CNN) architectures of ResNet-18 and DenseNet-201 and classical machine learning (ML) classifiers such as Wide Neural Networks (WNN), Naïve Bayes (NB), and two kernels of support vector machines (SVM) to classify apple slices into different hardness classes based on their RGB values. Our research data showed that the DenseNet-201 features classified by the SVM-Cubic kernel had the highest accuracy and lowest standard deviation (SD) among all the methods we tested, at 89.51 % 1.66 %. This classifier has proved to be the best compared to the others with two features, DenseNet-201 and ResNet-18, along with WNN, NB, and SVM (cubic and linear) kernels. MSC 2010: 68T45, 68U10, 65G20
Given the importance that the Iraqi banking system in general and Islamic banks in particular, there must be effective supervisory oversight of these banks, as supervisory oversight has an essential and effective role in the development and evaluation of the performance of banks, through the application of legal controls and rules. Banking aimed at making sure that its financial centers are safe, protecting depositors' funds, and achieving both monetary and economic stability. This research studied and evaluates the mechanisms and tools used by the Central Bank of Iraq in the supervision and supervision of these banks. Therefore, the research aimed to measure the type and direction of the relationship between the requirements of supervis
... Show MoreIntroduction: Breast cancer is the most common cancer and the major cause of cancer related deaths among Iraqi women. Due to the relatively late detection of breast cancer, the majority of the patients are still treated by modified radicle mastectomy. Aim: To assess the time lag between diagnosis of breast cancer and mastectomy among Iraqi patients; correlating the findings with other clinicopathological characteristics of the disease. Patients and methods: This retrospective study enrolled 226 Iraqi female patients who were diagnosed with breast cancer. Data were registered on the exact time period between signing the histopathological report and the surgical treatment. Other recorded variables included the age of the patients, their level
... Show MoreIntroduction: Breast cancer is the most common cancer and the major cause of cancer related deaths among Iraqi women. Due to the relatively late detection of breast cancer, the majority of the patients are still treated by modified radicle mastectomy. Aim: To assess the time lag between diagnosis of breast cancer and mastectomy among Iraqi patients; correlating the findings with other clinicopathological characteristics of the disease. Patients and methods: This retrospective study enrolled 226 Iraqi female patients who were diagnosed with breast cancer. Data were registered on the exact time period between signing the histopathological report and the surgical treatment. Other recorded variables included the age of the patients, their level
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More