Preferred Language
Articles
/
bsj-8547
Classification of Diseases in Oil Palm Leaves Using the GoogLeNet Model
...Show More Authors

The general health of palm trees, encompassing the roots, stems, and leaves, significantly impacts palm oil production, therefore, meticulous attention is needed to achieve optimal yield. One of the challenges encountered in sustaining productive crops is the prevalence of pests and diseases afflicting oil palm plants. These diseases can detrimentally influence growth and development, leading to decreased productivity. Oil palm productivity is closely related to the conditions of its leaves, which play a vital role in photosynthesis. This research employed a comprehensive dataset of 1,230 images, consisting of 410 showing leaves, another 410 depicting bagworm infestations, and an additional 410 displaying caterpillar infestations. Furthermore, the major objective was to formulate a deep learning model for the identification of diseases and pests affecting oil palm leaves, using image analysis techniques to facilitate pest management practices. To address the core problem under investigation, the GoogLeNet deep learning approach was applied, alongside various hyperparameters. The classification experiments were executed across 16 trials, each capped at a computational timeframe of 10 minutes, and the predominant duration spanned from 2 to 7 minutes. The results, particularly derived from the superior performance in Model 4 (M4), showed evaluation accuracy, precision, recall, and F1-score rates of 93.22%, 93.33%, 93.95%, and 93.15%, respectively. These were highly satisfactory, warranting their application in oil palm companies to enhance the management of pest and disease attacks.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of the Selective Model on the Acquisition of Kurdish Grammar Concepts among Female Students in the Eighth Grade
...Show More Authors

This research aims to identify the impact of the selective model in acquiring the concepts of Kurdish grammar among female students in the eighth grade, and to achieve the goal of research, the researcher selected the experimental design with partial control  and dimensional testing; the sample includes basic schools in the Chim district of Chamal/ Sulaymaniyah and randomly selected the basic school (Maha Bad) to be the field of application of the experiment and the random drawing method was chosen: two out of three sections and the number of students of the two sections is (75) students; section (C) represents the experimental group that studied the rules according to the selective model and its number is (37) students, while secti

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The importance of the application of the Value Added Tax system within the tax reform strategy in Iraq: model proposal
...Show More Authors

One of the globalization results is (VAT) , so it is important to consider its        results and impact on the tax system.    

     The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.

The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.

The history of (VAT)was also studied mentiorned and studied.

     As a conclusion (VAT) is one of the m

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of petrophysical properties of Sadi Formation in Halfaya oil field, southern Iraq
...Show More Authors

   This study aimed to evaluate the reservoir petrophysical properties (porosity, water saturation, and permeability) for optimal flow unit assessment within the Sadi Formation. Utilizing open hole logging data from five wells, the Sadi formation was divided into two rock units. The upper unit (A) is 45-50 meters thick, mainly consisting of limestone, mainly consisting of shaly limestone at the lower part. The lower unit (B) has a thickness of approximately 75-80 meters and is primarily composed of limestone, further subdivided into three subunits (B1, B2, B3). The average water resistivity is 0.04 ohm-m, and the average mud filtrate resistivity is 0.06 ohm-m. The Pickett plot was utilized to determine Archie parameters (tortuosit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Waste as a resource of economic resources: A case study using environmentalthe index MIP
...Show More Authors

Due to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we  have consideredwaste as an  alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need  of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Engineering And Technology Journal
Comparison between the Biological Activity of Agaricus bisporus Fruiting Bodies and Albizzia lebbeck Leaves Extract against Different Pathogenic Microoganisms
...Show More Authors

View Publication
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Approximate Numerical Solutions for Linear Volterra Integral Equations Using Touchard Polynomials
...Show More Authors

In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Improving Reverse Engineering Processes by using Articulated Arm Coordinate Measuring Machine
...Show More Authors

The invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref