In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial lung CT-scans into two groups (COVID-19 and NonCOVID-19) had been proposed. A dataset used is 960 slices of CT scan collected from Iraqi patients /Ibn Al-Nafis teaching hospital. The performance metrics are used in this study (accuracy, recall, precision, and F1 scores). The results indicate that the proposed approach generated a high-quality model for the collected dataset, with an overall accuracy of 98.95% and an overall recall of 97 %.
The ground pearls, Porphyrophora tritici (Bod.) is a new insect pest on wheat recorded for
the first time from Mousl Province, North of Iraq.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreA study of Zooplankton community has been carried out at four selected sites on Dukan Lake. Samples of water and zooplankton were collected monthly for the period from July 2015 to February 2016. Some physical and chemical properties of water were studied and the results showed that the air temperature were ranged from 0 to 36.16 °C, water temperature ranged from 2.83 to 34.66 °C, hydrogen ion concentration of studied sites were found to lie in alkaline side, it was ranged between 6.87 to 8.57, electrical conductivity ranged from 190.79 to 850.08 µs.cm¹, turbidity ranged from 0.9-7.7 NTU, and dissolved oxygen from 3.3 to 6.8 mg.l-¹ while BOD5 were ranged from 0.53 to 34.66 mg.l-¹. Concerning to the zooplankton, 37 species were ident
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThis research aims to knowledge of the scope of applying the international specification of which is regarded to occupational health and safety management system (OHSAS 18001) second edition for year 2007 by The AL-Mammon Factory / The General Company For Vegetable Oils Industry in order to diagnosis the gap between specification requirements and reality by using the checklist made based upon the items of the specification, after translating the English copy into Arabic. The results of the research and analysis that occupational health and safety management system in comparison to the specification requirements in all of its main items, which was (%22.26) applied and documented partly, this refer to the existence of great gap (%7
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreSeen in Iraq that the volume of insurance activity in the case of a clear deterioration and a sharp decline in demand for life insurance, because of reluctance by senior members of the Iraqi society on the demand for life insurance. The study was descriptive approach in identifying and addressing variables, namely the (perception of risk need of the individual trends in personal income of the individual insurance awareness of the individual customs and traditions of communal religious belief of the individual age and sex of the individual methods promotional company competitive alternatives to the insurance service life inflation rate service life insurance) indepen
... Show More
