<span lang="EN-US">Diabetes is one of the deadliest diseases in the world that can lead to stroke, blindness, organ failure, and amputation of lower limbs. Researches state that diabetes can be controlled if it is detected at an early stage. Scientists are becoming more interested in classification algorithms in diagnosing diseases. In this study, we have analyzed the performance of five classification algorithms namely naïve Bayes, support vector machine, multi layer perceptron artificial neural network, decision tree, and random forest using diabetes dataset that contains the information of 2000 female patients. Various metrics were applied in evaluating the performance of the classifiers such as precision, area under the curve (AUC), accuracy, receiver operating characteristic (ROC) curve, f-measure, and recall. Experimental results show that random forest is better than any other classifier in predicting diabetes with a 90.75% accuracy rate.</span>
Diabetes mellitus (DM) has been defined as a clinical syndrome that is characterized by abnormal carbohydrate metabolism. The chronic hyperglycemia of diabetes is associated with long term damage, dysfunction, and failure of different organs, especially the liver .This study was conducted to assess the effect obesity and insulin resistance on liver enzymes in diabetic Iraqi patients.A comparative study of (90) Iraqi adults divided to three subgroup(30) obese ,(30) nonobese diabetic patients and(30)person had used as control. The analysis included Liver enzyme ALP,ALT,AST,GGT ,Fasting Plasma Glucose (FBG) , Lipid Profile , Hemoglobin A1C , insulin and homeostasis model assessment of insulin resistance (HOMA IR) were measured. Subjects
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreMonetary policy occupies a prominent role in achieving monetary stability by adjusting the growth rates of the number of available means of payment in line with changes in the size of the gross domestic product in the country and expressed by the monetary stability coefficient agreed upon by the International Monetary Fund, a term that hides the fact that there is a rate of change in the volume of commodity or real production which expresses the levels of aggregate supply in the economy, which corresponds to the quantities of cash in circulation, which represent a net purchasing power and stimulate aggregate demand, which completes the picture of the existence of the market mechanism, expressed by the monetary or economic stability
... Show MoreThe interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreA growing and pressing need for Speech Enhancement Algorithms (SEAs) has emerged with the proliferation of hearing devices and mobile devices that aim to improve speech intelligibility without sacrificing speech quality. Recently, a tremendous number of studies have been conducted in the field of speech enhancement. This study aims to map the field of speech enhancement by conducting a systematic literature review to provide comprehensive details of recently proposed SEAs. This systematic review aims to highlight research trends in SEAs and direct researchers to the most important topics published between 2015 and 2024. It attempts to address seven key research questions related to this topic. Moreover, it covers articles available
... Show MoreThe research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc
... Show MorePopulation growth and economic and industrial development coupled have significantly accelerated the rate of Land Use and Land Cover (LULC) changes, particularly in developing countries, so finding optimum ways to observe these change has become a pressing issue. Quantification evaluation of these changes is crucial to comprehend and oversee land management conversion, therefore, it is necessary to evaluate the accuracy of various algorithms for LULC classification to determine the most effective classifier for Earth observation applications. The performance of Maximum Likelihood (ML), Support Vector Machines (SVM), Random Forest (RF), and K-Nearest Neighbors (KNN) was examined in this study, based on Sentinel 2A satellite images. T
... Show More