Search Results - "2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM)"

Refine Results
  1. 1

    Implementing a Novel Low Complexity CNN Model for Brain Tumor Detection by Al-Ani, Nawras, Al-Shamma, Omran

    “…All over the world, thousands of people die yearly from brain tumor disease. It is considered a life-threatening, prominent, and serious disease. Thus, saving…”
    Get full text
    Conference Proceeding
  2. 2

    Medical Images Classification Using Hybrid Deep Learning CNN-PSO-GA by Hasan, Tasneem Muhammed, Alneamy, Jamal

    “…Convolutional Neural Network (CNN) has made outstanding achievements in image processing and detection. The recent research uses CNN to classify the medical…”
    Get full text
    Conference Proceeding
  3. 3

    Machine Learning for Software Vulnerability Detection: A Survey by Ahmed, Shahad J., Taha, Dujan B.

    “…Software is increasingly becoming more prevalent in all aspects of life. All modern businesses, services, and products are dependent on software either…”
    Get full text
    Conference Proceeding
  4. 4

    An Intelligent Approach for Semantic Plagiarism Detection in Scientific Papers by Saeed, Ayoub Ali M., Taqa, Alaa Yaseen

    “…Plagiarism is the attempt to steal someone else's idea and portray it as your own, which is both unlawful and unethical. Plagiarism detection is described as…”
    Get full text
    Conference Proceeding
  5. 5

    Using TGARCH and ARMA-GARCH Models to Predict the Volatility in OPEC Oil prices by Al-Sharoot, Mohammed H., Al-Rashide, Hanan A.

    “…Some series are characterized to be of high volatility over time, especially with economic movements, such as stock prices or financial transactions and have…”
    Get full text
    Conference Proceeding
  6. 6

    Estimation of Rayleigh Process Parameters Using Classical and Intelligent Methods with Application by Hussain, Adel Sufyan, Sulaiman, Muthanna Subhi, Fatah, Khwazbeen S.

    “…In this paper, in this paper, the parameters of the Rayleigh process in the non-homogeneous Poisson process were estimated using the GWO method and the PSO…”
    Get full text
    Conference Proceeding
  7. 7

    Early Detection of Diabetic Retinopathy Using ResNet50 by Ghanime, Roua Waleed, Ali, Aseel Waleed

    “…With the rapid development of software engineering, various multimedia technologies, and continuous changes in the field of biotechnology, training…”
    Get full text
    Conference Proceeding
  8. 8

    Efficiency and Effectiveness in Utilizing Blended Learning in Context Aware Ubiquitous Learning Systems by Alkhayat, Rayan Yousif Yacob, Alobaydi, Esraa Khalid Ahmed, Abdullah, Omar Muayad, Mohd Arshad, Muhammad Rafie Hj

    “…Blended learning is widely spreading and uses many technologies as well as many serves learning objects. Various methods and models implemented and developed…”
    Get full text
    Conference Proceeding
  9. 9

    Improved UWB Antenna for 5G System Using Meta-Materials by Kadhim, Mustafa J., Rasool, Jamal Mohamed

    “…Four proposed antennas are discussed, and the best properties for fabrication have been selected in this article. The best property here is the gain, bandwidth…”
    Get full text
    Conference Proceeding
  10. 10

    Detection and Classification of Melanoma by Analysis of Skin Lesions Using Teledermatology by Alsarraf, Ammar Maher Mohammed, Ucan, Osman Nuri

    “…One of the worst kinds of skin cancer is called melanoma. Melanoma may be automatically diagnosed from dermoscopy images using image analysis algorithms, which…”
    Get full text
    Conference Proceeding
  11. 11

    Software Quality Measurement Analysis based on Techniques, Criteria, Metrics, Models, and Datasets by Alnaish, Zakaria A. Hamed, Hasoon, Safwan O.

    “…Software quality measurement considers a very crucial process in developing software. Achieving high-quality software leads to produce software with high…”
    Get full text
    Conference Proceeding
  12. 12

    Machine Learning based - System for Prediciting Mastitis in Dairy Cows by Mahmood, Ahmed Sami, Hamed, Tarfa Yaseen

    “…In this work, a comparative study on high-efficiency machine learning algorithms for the goal of incorporating machine learning and Veterinary Medicine has…”
    Get full text
    Conference Proceeding
  13. 13

    An Application of Dirac's Delta Function in Bivariate Beta-Gamma Distribution by Ali, Haithem Taha Mohammed, Abdulahad, Fedaa Noeel

    “…The Dirac delta function \delta(x)is one of the most important mathematical functions that is used successfully in physics and mathematics. Several authors…”
    Get full text
    Conference Proceeding
  14. 14

    A Safe Distance Monitoring System with an Ultrasonic Range Detector Sensor by Mohialden, Yasmin Makki, Hussien, Nadia Mahmood, Alwally, Hanan Abed

    “…Automobiles are one of the most useful and flexible ways to travel. But even though they are convenient and common, they are also very dangerous. Each year,…”
    Get full text
    Conference Proceeding
  15. 15

    On the Use of Virtual Reality in Visualizing Interactive Network Models for Big Data by Hisham, Ahmed, Mahmood, Basim

    “…The current revolution in technology forces most daily life systems to generate large-scale data. Understanding such data is not an easy task due to its size…”
    Get full text
    Conference Proceeding
  16. 16

    Based Complex Key Cryptography: New Secure Image Transmission Method utilizing Confusion and Diffusion by Hashim, Mohammed Mahdi, Kareem, Marwah M., Al-Azzawi, Waleed Khalid, Nahi, Abdullah A., Taha, Mustafa Sabah, Ali, Adnan Hussien

    “…Recently, the transport massive and secure data are fateful and difficult in communication over the IoT. Due to their widespread use and ease of transmission,…”
    Get full text
    Conference Proceeding
  17. 17

    Behavioral Features of Users as a Security Solution in Cloud Computing by Sheet, Mohammed Fawzi, Saeed, Melad Jader

    “…A large number of establishments and organizations implement clouds to store their databases. More active attacks are used on clouds to get unauthorized access…”
    Get full text
    Conference Proceeding
  18. 18

    Classification of Written and Spoken Arabic Letters based on Deep Learning by Fadhel, Mazin Ali, Mohammed, Yusra Faisal

    “…This research focuses on automatic Arabic speech recognition (AASR) (Arabic characters) as well as Arabic character handwriting recognition. The Mel…”
    Get full text
    Conference Proceeding
  19. 19

    Construction of Marshall-Olkin Lindley Distribution with Application by Hameed, Abdullah Nabeel, Saieed, Hayfa Abdul Jawad

    “…The one-parameter Lindley distribution was generalized by using the Marshall-Olkin family. This new distribution is named Marshall Olkin Lindley Distribution…”
    Get full text
    Conference Proceeding
  20. 20

    A Comparative Study Among Some Natural-Inspired Optimization Algorithms by Alneamy, Jamal Salahaldeen, Alnaish, Rahma A. Hamed

    “…Biologically inspired algorithms such as Ant colony optimization (ACO), Firefly algorithm (FA), Artificial Bee Colony (ABC), biogeography-based optimization…”
    Get full text
    Conference Proceeding