Preferred Language
Articles
/
bsj-8564
Detection of Autism Spectrum Disorder Using A 1-Dimensional Convolutional Neural Network
...Show More Authors

Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D CNNs have shown improved accuracy in the classification of ASD compared to traditional machine learning algorithms, on all these datasets with higher accuracy of 99.45%, 98.66%, and 90% for Autistic Spectrum Disorder Screening in Data for Adults, Children, and Adolescents respectively as they are better suited for the analysis of time series data commonly used in the diagnosis of this disorder

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Self-Localization of Guide Robots Through Image Classification
...Show More Authors

The field of autonomous robotic systems has advanced tremendously in the last few years, allowing them to perform complicated tasks in various contexts. One of the most important and useful applications of guide robots is the support of the blind. The successful implementation of this study requires a more accurate and powerful self-localization system for guide robots in indoor environments. This paper proposes a self-localization system for guide robots.  To successfully implement this study, images were collected from the perspective of a robot inside a room, and a deep learning system such as a convolutional neural network (CNN) was used. An image-based self-localization guide robot image-classification system delivers a more accura

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
مجلة واسط للعلوم والطب
Study of nuclear characters to some 164, 166, 168 68 Er isotopes by using the interacting boson model IBM-1
...Show More Authors

The aim of this study is to show the concepts of nuclear shape and the geometrical picture to the even-even nuclei of 164,166,168E isotopes in the context of the Interacting boson Model IBM-1. The energy spectra were calculated and the effective charge values (eB) of the electromagnetic transition strength were obtained and used to calculate the B(E2) values of the electromagnetic transitions and the quadrupole moment Q of 2+ -states. The Hamiltonian parameters were calculated by taking in account the properties of these nuclei. Comparison were made with the available experimental data and included in tables. The geometrical picture of these nuclei were looked at by calculating the deformation which were represented by the potentia

... Show More
Publication Date
Sun Oct 31 2021
Journal Name
Iraqi Geological Journal
Optimizing Water Injection Performance by Using Sector Modeling of the Mishrif Formation in West Qurna-1 Oil Field, Southern Iraq
...Show More Authors

The regular job of a reservoir engineer is to put a development plan to increase hydrocarbon production as possible and within economic and technical considerations. The development strategy for the giant reservoir is a complex and challenging task through the decision-making analysis process. Due to the limited surface water treatment facility, the reservoir management team focuses on minimizing water cut as low as possible by check the flow of formation and injected water movement through the Mishrif reservoir. In this research, a representative sector was used to make the review of water injection configuration, which is considered an efficient tool to make study in a particular area of the entire field when compared with the ful

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Hepatocellular Carcinoma Prediction and early Diagnosis of Hepatitis B and C viral infection using miR-122 and miR-223 in a sample of Iraqi patients.
...Show More Authors

Hepatocellular carcinoma (HCC) is the third most common cause of cancer-related death. Therefore, it is critical for researchers to understand molecular biology in greater depth.  In several diseases including cancer, abnormal miRNA expression has been linked to apoptosis, proliferation, differentiation, and metastasis. Many miRNAs have been studied in relation to cancer, including miR-122, miR-223, and others. Hepatitis B and C viruses are the most important global risk factors for HCC. This study is intended to test whether serum miRNAs serve as a potential biomarker for both HCC and viral infections HBV and C. The expression of miRNA in 64 serum samples was analyzed by RT-qPCR. Compared to healthy volunteers, HCC patients' sera expre

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effect of the think, pair, and share strategy of using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women
...Show More Authors

The research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Advances In Information Technology
Towards Accurate SDG Research Categorization: A Hybrid Deep Learning Approach Using Scopus Metadata
...Show More Authors

The complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Clinicopathological and Immunohistochemical Analysis of 21 cases of Traumatic Ulcerative Granuloma with Stromal Eosinophilia Using CD30, CD68 and TGF-β1
...Show More Authors

Background: Traumatic ulcerative granuloma with stromal eosinophilia is an impressive benign chronic ulcerative lesion of the oral mucosa with vague etiopathogenesis. It was supposed to represent an oral counterpart of primary cutaneous CD30+ lymphoproliferative disorder. Histopathologically, it is characterized by mixed inflammatory infiltrate predominated by histiocytes, lymphocytes and eosinophils along with presence of scattered large atypical mononuclear cells. It has worrisome clinical presentation. It may heal spontaneously, but in most occasions it persists and never heal unless removed surgically (incisional or excisional biopsy). A rare subset may show worrisome immunohistochemical features. Follow up is highly recommended. Mat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
The Spectrum and the Numerical Range of the Product of Finite Numbers of Automorphic Composition Operators on Hardy Space 2
...Show More Authors

Throughout this paper we study the properties of the composition operator
C
p1  o
p2  o…o
pn  induced by the composition of finite numbers of special
automorphisms of U,
pi  (z)  i
i
p z
1 p z


Such that pi  U, i  1, 2, …, n, and discuss the relation between the product of
finite numbers of automorphic composition operators on Hardy space H2 and some
classes of operators.

View Publication Preview PDF