Preferred Language
Articles
/
e4a1MYYBIXToZYAL3X5G
Predicting Fruit’s Sweetness Using Artificial Intelligence—Case Study: Orange
...Show More Authors

The manual classification of oranges according to their ripeness or flavor takes a long time; furthermore, the classification of ripeness or sweetness by the intensity of the fruit’s color is not uniform between fruit varieties. Sweetness and color are important factors in evaluating the fruits, the fruit’s color may affect the perception of its sweetness. This article aims to study the possibility of predicting the sweetness of orange fruits based on artificial intelligence technology by studying the relationship between the RGB values of orange fruits and the sweetness of those fruits by using the Orange data mining tool. The experiment has applied machine learning algorithms to an orange fruit image dataset and performed a comparative study of the algorithms in order to determine which algorithm has the highest prediction accuracy. The results showed that the value of the red color has a greater effect than the green and blue colors in predicting the sweetness of orange fruits, as there is a direct relationship between the value of the red color and the level of sweetness. In addition, the logistic regression model algorithm gave the highest degree of accuracy in predicting sweetness.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jul 19 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Game Theory to Determine the Optimal Strategy for the Transportation Sector in Iraq
...Show More Authors

In this paper, game theory was used and applied to the transport sector in Iraq, as this sector includes two axes, the public transport axis and the second axis the private transport axis, as each of these axes includes several types of transport, namely (sea transport, air transport, land transport, transport by rail, port transport) and the travel and tourism sector, as public transport lacks this sector, as the competitive advantage matrix for the transport sector was formed and after applying the MinMax-MaxMin principle to the matrix in all its stages, it was found that there was an equilibrium point except for the last stage where the equilibrium point was not available Therefore, the use of the linear programming method was

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of using blockchain technology in improving the quality of digital financial reports
...Show More Authors

This study aims mainly to identify the role of the use of blockchain technology in improving the quality of digital financial reports, answering questions and testing the hypothesis of the study, the researchers relied on the descriptive analytical approach, and to obtain the necessary data a questionnaire was distributed after evaluation to the study community.

The results of the study have shown that the use of blockchain technology helps to provide a high degree of reliability in digital financial reports published to banks over the Internet, ensure the speed of completion and completion, and maintain the privacy and confidentiality of the information contained in the digital financial reports of banks

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
International Journal Of Scientific Research
Anatomical differences of Cerebellar vermismeasurement values in healthy adult men andwomen using MRI images
...Show More Authors

Background: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
International Society For The Study Of Vernacular Settlements
Evaluation of Sustainability Using LEED Rating Scales: The Bismayah New City in Baghdad, Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Caspian Journal Of Environmental Sciences
DNA-damage in blood of welders occupationally exposed to welding fume using comet assay
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Nov 17 2022
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Effect of Using Grids On the Behaviour of Portland Limestone Cement Self Compacted Concrete.
...Show More Authors

The civil engineering field currently focus on sustainable development. It is important to develop new sustainable and economic generations of concrete, using eco-friendly materials in the construction industry with a fair amount of costs and minimizing the impact upon the environment by reducing CO2 emissions from the cement industry as a whole while still obtaining high cement quality and strength. The main objective of this research is to clarify the mechanical behavior and ability to use Portland limestone cement in producing self compacted concrete, due to the beneficious effec of the limestone cement economically and enviromently. The research investigates the effect of using steel and polymer meshs as reinforcement, where the results

... Show More
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Buckling Analysis of Laminated Composite Plate with Different Boundary Conditions using modified Fourier series
...Show More Authors

Buckling analysis of a laminated composite thin plate with different boundary conditions subjected to in-plane uniform load are studied depending on classical laminated plate theory; analytically using (Rayleigh-Ritz method). Equation of motion of the plates was derived using the principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. The eigenvalue problem generated by using Ritz method, the set of linear algebraic equations can be solved using MATLAB for symmetric and anti-symmetric, cross and angle-ply laminated plate considering some design parameters such as aspect ratios, number of layers, lamination type and orthotropic ratio. The results obtained g

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Advances In Science, Technology & Innovation
Producing a Three Dimensional Model for the University of Baghdad Campus Using GIS Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref