Preferred Language
Articles
/
VBhwMpUBVTCNdQwCwSoD
Analyzing the behavior of different classification algorithms in diabetes prediction
...Show More Authors

<span lang="EN-US">Diabetes is one of the deadliest diseases in the world that can lead to stroke, blindness, organ failure, and amputation of lower limbs. Researches state that diabetes can be controlled if it is detected at an early stage. Scientists are becoming more interested in classification algorithms in diagnosing diseases. In this study, we have analyzed the performance of five classification algorithms namely naïve Bayes, support vector machine, multi layer perceptron artificial neural network, decision tree, and random forest using diabetes dataset that contains the information of 2000 female patients. Various metrics were applied in evaluating the performance of the classifiers such as precision, area under the curve (AUC), accuracy, receiver operating characteristic (ROC) curve, f-measure, and recall. Experimental results show that random forest is better than any other classifier in predicting diabetes with a 90.75% accuracy rate.</span>

Scopus Crossref
View Publication
Publication Date
Mon Sep 18 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Contribution of hunting cooperation and antipredator behavior to the dynamics of the harvested prey-predator system
...Show More Authors

Fear, harvesting, hunting cooperation, and antipredator behavior are all important subjects in ecology. As a result, a modified Leslie-Gower prey-predator model containing these biological aspects is mathematically constructed, when the predation processes are described using the Beddington-DeAngelis type of functional response. The solution's positivity and boundedness are studied. The qualitative characteristics of the model are explored, including stability, persistence, and bifurcation analysis. To verify the gained theoretical findings and comprehend the consequences of modifying the system's parameters on their dynamical behavior, a detailed numerical investigation is carried out using MATLAB and Mathematica. It is discovered that the

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Effect of Pre-Tension and Orientation on the Springback Behavior of the Sheet Brass 65-35
...Show More Authors

One of the most important phenomenon that occurs in sheet metal forming processes is the spring-back, which causes several geometrical alterations in the parts. The accurate prediction of springback after bending unloading is the key to the tool design, operation control, and precision estimate concerning the part geometry. This study investigated experimentally the effect of pretension in three rolling direction (0, 90, 45 degree) on the springback behavior of the yellow brass, sheet under V shape bending die. The pre-tension ranges from five different levels starting of 11% to 55% from the total strain in each rolling direction by regular increase of 11 %, then bent on a V-die 90 degree for the springback estimate. From experiment the

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Artificial Saliva on The Surface Roughness of Different Esthetic Archwires (An in Vitro Study)
...Show More Authors

Background:The demand for esthetic orthodontic appliances is increasing so that the esthetic orthodontic archwires were introduced. This in vitro study was designed to evaluate the surface roughness offiber-reinforced polymer composite (FRPC) archwires compared to coated nickel-titanium (NiTi) archwires immersed in artificial saliva. Materials and Methods:Three types of esthetic orthodontic archwires were used: FRPC (Dentaurum), Teflon coated NiTi (Dentaurum) and epoxy coated NiTi (Orthotechnology). They were round (0.018 inch) in cross section and cut into pieces of 15 mm in length.Forty pieces from each type were divided into four groups; one group was left at a dry condition and the other three groups were immersed in artificial saliva (

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 27 2013
Journal Name
Engineering And Technology Journal
Total and Matric Suction in Unsaturated Soil with the Existence of Different Salts Content
...Show More Authors

Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Model of Wind Turbine Power Control System with Fuzzy Regulation by Mamdani and Larsen Algorithms
...Show More Authors

Abstract 

     The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of  the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (32)
Crossref (18)
Scopus Crossref
Publication Date
Mon Jul 31 2023
Journal Name
International Journal Of Sustainable Development And Planning
Monitoring and Prediction Functional Change of Land Uses Toward Urban Sustainability
...Show More Authors

Urban land uses are in a dynamic state that varies over time, the city of Karbala in Iraq has experienced functional changes over the past 100 years, as the city is characterized by the presence of significant tourist and socio-economic activity represented by religious tourism, and it occur due to various reasons such as urbanization. The purpose of this study is to apply a Markov model to analyze and predict the behavior of transforming the use of land in Karbala city over time. This can include the conversion of agricultural land, or other areas into residential, commercial, industrial land uses. The process of urbanization is typically driven by population growth, economic development, based on a set of probabilities and transitions bet

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Applied Engineering Science
Rutting prediction of hot mix asphalt mixtures reinforced by ceramic fibers
...Show More Authors

One of the most severe problems with flexible asphalt pavements is permanent deformation in the form of rutting. Accordingly, the practice of adding fiber elements to asphalt mix to improve performance under dynamic loading has grown significantly in order to prevent rutting distress and ensure a safe and long-lasting road surface. This paper explores the effects of a combination of ceramic fiber (CF), a low-cost, easily available mineral fiber, and thermal insulator fiber reinforced to enhance the Marshall properties and increase the rutting resistance of asphalt mixes at high temperatures. Asphalt mixtures with 0%, 0.75%, 1.5%, and 2.25% CF content were prepared, and Marshall stability and wheel tracking tests were employed to stu

... Show More
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Mon Dec 02 2024
Journal Name
Engineering, Technology &amp; Applied Science Research
An Artificial Neural Network Prediction Model of GFRP Residual Tensile Strength
...Show More Authors

This study uses an Artificial Neural Network (ANN) to examine the constitutive relationships of the Glass Fiber Reinforced Polymer (GFRP) residual tensile strength at elevated temperatures. The objective is to develop an effective model and establish fire performance criteria for concrete structures in fire scenarios. Multilayer networks that employ reactive error distribution approaches can determine the residual tensile strength of GFRP using six input parameters, in contrast to previous mathematical models that utilized one or two inputs while disregarding the others. Multilayered networks employing reactive error distribution technology assign weights to each variable influencing the residual tensile strength of GFRP. Temperatur

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref