Wasit Journal of Computer and Mathematics Science最新文献

筛选
英文 中文
Deep Learning Based Hybrid Classifier for Analyzing Hepatitis C in Ultrasound Images 基于深度学习的混合分类器分析超声图像中的丙型肝炎
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.65
Hussein Al-ogaili
{"title":"Deep Learning Based Hybrid Classifier for Analyzing Hepatitis C in Ultrasound Images","authors":"Hussein Al-ogaili","doi":"10.31185/wjcm.65","DOIUrl":"https://doi.org/10.31185/wjcm.65","url":null,"abstract":"Although liver biopsy is the gold standard for identifying diffuse liver disorders, it is an intrusive procedure with a host of negative side effects. Physician subjectivity may affect the ultrasonography diagnosis of diffuse liver disease. As a result, there is still a clear need for an appropriate classification of liver illnesses. In this article, an unique deep classifier made up of deep convolutional neural networks (CNNs) that have already been trained is proposed to categories the liver condition. The variants of ResNet and AlexNet are a few networks that are combined with fully connected networks (FCNs). Transfer learning can be used to extract deep features that can offer adequate categorization data. Then, an FCN can depict images of the disease in its many stages, including tissue, liver hepatitis, and hepatitis. To discriminate between these liver images, three different (normal/cirrhosis, perfectly natural, and cirrhosis/hepatitis) and 3 (normal/cirrhosis/hepatitis) models were trained. A hybrid classifier is presented in order to integrate the graded odds of the classes produced by each individual classifier since two-class classifiers performed better than three-class classifiers. The class with the highest score is then chosen using a majority voting technique. The experimental results demonstrate an high accuracy when liver images were divided into three classes using ResNet50 and a hybrid classifier.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cheating in E-learning from the perspective of lecturers within Iraqi universities 从伊拉克大学讲师的角度看电子学习中的作弊行为
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.70
Mohammed Hasan abd
{"title":"Cheating in E-learning from the perspective of lecturers within Iraqi universities","authors":"Mohammed Hasan abd","doi":"10.31185/wjcm.70","DOIUrl":"https://doi.org/10.31185/wjcm.70","url":null,"abstract":"Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested  a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical methods. In order to verify that the design of the questionnaire, has been followed up with two steps of verification. First of all, a approval stage within that , the list of questions examined by the section of  specialists in this subject in computer technology and teaching in universities, the feedback received was implemented before proceeding in order in order to this second stage . Second of all, the pilot research has been carried out to check the dependability of the factors . The gathered data has been examined using the Cronbach’s Alpha coefficient dependability test in SPSS 18 software package. This final results demonstrated this all factors are dependable as they acquired a value of 0.9126 and above inside test.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131140822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Networks Data Transfer Classification Based On Neural Networks 基于神经网络的网络数据传输分类
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.96
Doaa Mohsin Abd Ali, Donia Fadil Chalob, Ameer Badr Khudhair
{"title":"Networks Data Transfer Classification Based On Neural Networks","authors":"Doaa Mohsin Abd Ali, Donia Fadil Chalob, Ameer Badr Khudhair","doi":"10.31185/wjcm.96","DOIUrl":"https://doi.org/10.31185/wjcm.96","url":null,"abstract":"Data transmission classification is an important issue in networks communications, since the data classification process has the ultimate impact in organizing and arranging it according to size and area to prepare it for transmission to minimize the transmission bandwidth and enhancing the bit rate. There are several methods and mechanisms for classifying the transmitted data according to the type of data and to the classification efficiency. One of the most recent classification methods is the classification of artificial neural networks (ANN). It is considered one of the most dynamic and up-to-date research in areas of application. ANN is a branch of artificial intelligence (AI). The neural network is trained by backpropagation algorithm. Various combinations of functions and their effect while utilizing ANN as a file, classifier was studied and the validity of these functions for different types of datasets was analyzed. Back propagation neural university (BPNN) supported with Levenberg Marqurdte (LM) activation function might be utilized with as a successful data classification tool with a suitable set of training and learning functions which operates, when the probability is maximum. Whenever the maximum likelihood method was compared with backpropagation neural network method, the BPNN supported with Levenberg Marqurdte (LM) activation function was further accurate than maximum likelihood method. A high predictive ability against stable and well-functioning BPNN is possible. Multilayer feed-forward neural network algorithm is also used for classification. However BPNN supported with Levenberg Marqurdte (LM) activation function proves to be more effective than other classification algorithms.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132146380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Online translated system: DESIGN AND Implementation 在线翻译系统:设计与实现
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.81
Sundresan Perumal
{"title":"Online translated system: DESIGN AND Implementation","authors":"Sundresan Perumal","doi":"10.31185/wjcm.81","DOIUrl":"https://doi.org/10.31185/wjcm.81","url":null,"abstract":"In the presence of technology and taking into account the concept of globalization, the application of chat is one of the most important aspects of our daily life to use different purposes that meet the needs of education, business and personal communication where the barrier is the language in most cases. Although we can send text using the chat app but there is still no known chat app where people can chat in different languages with the help of automatic translation system. Here the author decided to develop a mobile application with a chat and translation system in which users can chat in their preferred language for the translation system. Businessmen will help to facilitate communication with their foreign partners and students can talk to their friends abroad. It is useful to learn different languages and is useful to communicate with each other. Users only need to select the language they want to chat from the specified system. The system will use the Microsoft Translator API to translate in different languages.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130900619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart robot using in smart homes 智能家居中使用的智能机器人
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.84
Bellatca Naptsoksch
{"title":"Smart robot using in smart homes","authors":"Bellatca Naptsoksch","doi":"10.31185/wjcm.84","DOIUrl":"https://doi.org/10.31185/wjcm.84","url":null,"abstract":"the smart robot is an important part of the smart homes system, in this research the Arduino Vacuum Cleaner we built is very compact and practical for potential office and home use. The developed robot is disk-shaped, equipped with vacuuming and cleaning technology and controlled by Arduino nano. \u0000It sucks dirt via a retractable dustbin, using a fan within a motor. the device will be deployed for office and home use thereby making cleaning a fully autonomous duty. This robot will have ultrasonic sensors and an IR proximity sensor. The ultrasonic sensor will allow the robot to avoid obstacles so that it can move freely until the room is properly cleaned, and the proximity sensor will help it to avoid falling from stairs. \u0000One of the most important features of our floor cleaning robot is that it is fast and flexible in movement, able to deal with all dirt and stains on floors without human intervention. \u0000It is also characterized by the fact that it can be disassembled and installed with ease and simplicity, so that in the event of a malfunction, any malfunction will be repaired at the same time. It is also characterized by possessing sensors, so it can identify the .It is possible to develop this technique to become more used in various fields. Because we are in the world of technology development, it becomes very easy to develop such \u0000projects to benefit from them in daily life.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review paper of overlapping stenosis in artery 动脉重叠狭窄综述
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.93
Hawraa Dheyaa Asfoor
{"title":"Review paper of overlapping stenosis in artery","authors":"Hawraa Dheyaa Asfoor","doi":"10.31185/wjcm.93","DOIUrl":"https://doi.org/10.31185/wjcm.93","url":null,"abstract":"Blood diseases are considered one of the most common diseases in the world for humans, which occurs as a result of abnormal growth on the artery wall, which leads to strokes and heart attacks, given that the artery is a tube. There are many types of narrowing of the arteries that can be described mathematically. In this research, we will explain again considering the overlapping stenosis of the artery and describing it mathematically.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganography Based On Chaotic System for Random LSB Positions 基于混沌系统的随机LSB位置隐写
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.95
Rusul Mansoor
{"title":"Steganography Based On Chaotic System for Random LSB Positions","authors":"Rusul Mansoor","doi":"10.31185/wjcm.95","DOIUrl":"https://doi.org/10.31185/wjcm.95","url":null,"abstract":"The objective of hiding text in an image is hiding text without raising suspicions that the image contains a hidden message or text, which leads to protecting and maintaining text confidentiality. The previous hiding methods have problems in capacity, randomization, and imperceptibility. This paper will be solved some of these problems; we suggested a new method for hiding text in an image. Firstly, encrypting the text by the AES-192 bit algorithm for obtaining a secret message. When the initial key of the AES-192 (bit) algorithm is generated by a chaotic system for randomness purposes, secondly, hiding the secret message is into a gray image for obtaining a stego-image. The hiding step is based on a proposed map that chooses from the last round of key expansion in the AES-192 algorithm. This map represented random positions of LSB in each byte of the gray image. The experimental result of this method proved a successful method based on metric criteria. Also, this method is the very speed for hiding ciphertext in the gray image as well as extracting ciphertext from the gray image. Also, it is very safe because it is difficult for attackers to distinguish between the original image and the stego image therefore the correlation between the original image and the stego- image is very close to 1.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Method for Hiding Text in Image Using Header Image 一种利用标题图像隐藏文本的改进方法
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.79
Nada Abdul aziz Mustafa
{"title":"An Improved Method for Hiding Text in Image Using Header Image","authors":"Nada Abdul aziz Mustafa","doi":"10.31185/wjcm.79","DOIUrl":"https://doi.org/10.31185/wjcm.79","url":null,"abstract":"The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embedding of several stages of complexity. Also, LSB method via using the whole image is to increase the security and robustness of the proposed method as compared to state-of the-art methods.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A critical review of Optimization MANET routing protocols 对优化MANET路由协议的重要回顾
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.94
Riyadh Rahef Nuiaa Al Ogaili, Ali Hakem Alsaeedi, Salam Saad Alkafagi, Ali Saeed D. Alfoudi
{"title":"A critical review of Optimization MANET routing protocols","authors":"Riyadh Rahef Nuiaa Al Ogaili, Ali Hakem Alsaeedi, Salam Saad Alkafagi, Ali Saeed D. Alfoudi","doi":"10.31185/wjcm.94","DOIUrl":"https://doi.org/10.31185/wjcm.94","url":null,"abstract":"The main challenges in routing protocols are node mobility, resource constraints, error-prone channel states, and problems with hidden and unprotected terminals. This article provides an overview of the main protocols, their problems, and ways to improve them. The cell phone allows communication between two moving units via mobile stations (MS), mobile units, and landing units. The term \"mobile ad hoc network\" (MANET) refers to a group of devices connecting and communicating. The military, law enforcement, and emergency services have quickly become interested in MANETS because they provide a high quality of service. Path loss (PL), one of the biggest problems in wireless communications, can be caused by multiple reflections from an obstacle or by the source of the signal being far from the destination on the network. Multipath propagation, path loss, and interference reduce the network's quality of service (QoS). The best route is added to a router's routing table using a dynamic routing protocol, and an alternate path is chosen when the primary route is unavailable.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Automation system over Cloud by Using Internet of Things Applications 基于物联网应用的云上自动化系统
Wasit Journal of Computer and Mathematics Science Pub Date : 2022-12-31 DOI: 10.31185/wjcm.88
Kevin R. B. Butler
{"title":"An Automation system over Cloud by Using Internet of Things Applications","authors":"Kevin R. B. Butler","doi":"10.31185/wjcm.88","DOIUrl":"https://doi.org/10.31185/wjcm.88","url":null,"abstract":"By the virtue of blooming automation industry and wireless connectivity, all the devices within the home can be connected. Today's World is moving to digitalization where everything is made easy and comfortable for people i.e., young youth as well as senior citizen. Smart Automated House Application using IOT (Internet of Thing) is a system where basic house facility can be handled by device from any place such as ON and Off of Light, Fan, AC, Water pump, Gardening of Water. One can handle all these things with help of device NodeMCU ESP8266, Android Application, Internet Connection. This paper include functionality of node esp8266 are connected with either of above given house application like fan, light, water pump, gardening with help of coding and hosting online with web server. All the functionality is handled by Mobile App created in android application, from which house application are controlled with help of internet. This paper is clarifying that monitoring of circuit devices through wireless using Node MCU and controlling using App Blynk. According to requirement of need one can connect multiple device like sensors, appliance and many more till 8.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信