Preferred Language
Articles
/
bsj-6641
Recurrent Stroke Prediction using Machine Learning Algorithms with Clinical Public Datasets: An Empirical Performance Evaluation
...Show More Authors

Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning algorithms implementation in the recurrent stroke prediction models. This research aims to investigate and compare the performance of machine learning algorithms using recurrent stroke clinical public datasets. In this study, Artificial Neural Network (ANN), Support Vector Machine (SVM) and Bayesian Rule List (BRL) are used and compared their performance in the domain of recurrent stroke prediction model. The result of the empirical experiments shows that ANN scores the highest accuracy at 80.00%, follows by BRL with 75.91% and SVM with 60.45%.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 25 2019
Journal Name
Advances In Intelligent Systems And Computing
Solving Game Theory Problems Using Linear Programming and Genetic Algorithms
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Al-khwarizmi Engineering Journal
Noise Removal of ECG Signal Using Recursive Least Square Algorithms
...Show More Authors

This paper shows an approach for Electromyography (ECG) signal processing based on linear and nonlinear adaptive filtering using Recursive Least Square (RLS) algorithm to remove two kinds of noise that affected the ECG signal. These are the High Frequency Noise (HFN) and Low Frequency Noise (LFN). Simulation is performed in Matlab. The ECG, HFN and LFN signals used in this study were downloaded from ftp://ftp.ieee.org/uploads/press/rangayyan/, and then the filtering process was obtained by using adaptive finite impulse response (FIR) that illustrated better results than infinite impulse response (IIR) filters did.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit bank credit risk in accordance with international auditing standards: Applied research at Rafidain Bank, Public Administration - Baghdad
...Show More Authors

This research dealt with the subject of auditing bank credit risks in accordance with international auditing standards and aims to develop procedures and design a credit risk audit program in accordance with international auditing standards and demonstrate their impact on the truth, truthfulness and fairness of financial statements and on their overall performance and continuity in the banking sector Its importance lies in relying on international auditing standards to assess and measure bank credit risk and its impact on the financial situation as well as the ability to predict financial failure. A set of conclusions have been reached, the most important of which is that the bank faces difficulties in measuring credit risk in accordance

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 28 2020
Journal Name
Journal Of Law And Humanities Sciences
Fair compensation for expropriation for the public benefit (A comparative study)
...Show More Authors

The right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?

Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Combining Video Lectures and Kolb Experiential Learning on EFL Student-Teachers’ Ability to Teach Communicative Coursebook and their Teaching Competencies
...Show More Authors

Communicative-based textbooks are developed and disseminated throughout the country.
However, it is difficult for teachers who themselves have learnt English through the traditional
approaches to suddenly be familiar with CLT (Communicative Language Teaching) principles
and teach communicatively. Therefore, many teachers remain somewhat confused about what
exactly CLT is and others familiar with CLT but unable to achieve communicative classroom
teaching. Consequently, those teachers need to be introduced to the CLT principles and they need
training in how to put CLT principles into practice. Accordingly, this study aims to find out the
effect of combining video lectures and Kolb experiential learning on EFL student-t

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
Journal Of Economics And Administrative Sciences
Effect of Attitudes in the ethics of the public job of the individual
...Show More Authors

Attitude is an important subject that has attracted researchers and thinkers in organizational theory and organizational behavior because of its great importance in various field studies. Field evidence suggests that individuals in their daily lives or careers respond to specific events through a set of internal tendencies Internal tendencies are negative or positive and systematic. These trends tend to be invisible, not limited to certain boundaries, and involve a significant number of individuals within organizations or society.

 The research aims to identify the impact of trends in the ethics of public service workers for individuals, through a sample of (72) doctors and (60) administrative staff

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
Public leave for modernists Its benefits and the judgment of its operation
...Show More Authors

2 The benefit of the leave of our time is the leakage and inclusion in the series of narrators of modern.
3 The leave is therefore permissible to narrate the hadeeth or other sciences from a sheik or sheiks, and not
the talk.
4 It is not necessary that the grantee of the leave has studied the student who is the holder of the leave.
5 - in which a great meaning is the sense of the recipient seeking blessing through the link
With attribution to our master Muhammad peace be upon him.

View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Unifying The Evaluation Criteria Of Many Objectives Optimization Using Fuzzy Delphi Method
...Show More Authors

Many objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector.  Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref