首页 > 最新文献

Iraqi Journal for Computers and Informatics最新文献

英文 中文
PREDICTING MEDICINE DEMAND USING DEEP LEARNING TECHNIQUES 使用深度学习技术预测药品需求
Pub Date : 2023-09-14 DOI: 10.25195/ijci.v49i2.427
Bashaer Abdurahman Mousa, Belal Al-Khateeb
Medication supply and storage are essential components of the medical industry and distribution. Most medications have a predetermined expiration date. When the demand is met in large quantities that exceed the actual need, this leads to the accumulation of medicines in the stores, and this leads to the expiration of the materials. If demand is too low, this will have an impact on consumer happiness and drug marketing.Therefore, it is necessary to find a way to predict the actual quantity required for the organization's needs to avoid material spoilage and storage problems. A mathematical prediction model is required to assist any management in achieving the required availability of medicines for customers and safe storage of medicines. The research question is to design a system based on deep learning that can predict the amount of drugs required with high efficiency and accuracy based on the chronology of previous years.Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), Bidirectional LSTM, and Gated Recurrent Unit (GRU) are used to build prediction models. Those models allow for the optimization of inventory levels, thus reducing costs and potentially increasing sales. Various measures such as mean squared error (MSE), mean absolute squared error (MASE), root mean squared error (RMSE), and others are used to evaluate the prediction models. RNN model achieved the best result with MSE: 0.019 MAE: 0.102, RMSE: 0.0.
药品供应和储存是医疗行业和分销的重要组成部分。大多数药物都有预定的有效期。当需求被大量满足而超过实际需要时,就会导致药品在仓库中堆积,从而导致物资过期。如果需求过低,这将对消费者的幸福感和药品营销产生影响。因此,有必要找到一种方法来预测组织需要的实际数量,以避免材料损坏和储存问题。需要一个数学预测模型来协助任何管理人员实现客户所需的药品供应和药品的安全储存。研究问题是设计一个基于深度学习的系统,根据前几年的年表,高效准确地预测所需药物的数量。利用循环神经网络(RNN)、长短期记忆(LSTM)、双向LSTM和门控循环单元(GRU)建立预测模型。这些模型允许优化库存水平,从而降低成本并潜在地增加销售。各种测量,如均方误差(MSE),平均绝对平方误差(MASE),均方根误差(RMSE)等,用于评估预测模型。RNN模型以MSE: 0.019 MAE: 0.102, RMSE: 0.0获得最佳结果。
{"title":"PREDICTING MEDICINE DEMAND USING DEEP LEARNING TECHNIQUES","authors":"Bashaer Abdurahman Mousa, Belal Al-Khateeb","doi":"10.25195/ijci.v49i2.427","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.427","url":null,"abstract":"Medication supply and storage are essential components of the medical industry and distribution. Most medications have a predetermined expiration date. When the demand is met in large quantities that exceed the actual need, this leads to the accumulation of medicines in the stores, and this leads to the expiration of the materials. If demand is too low, this will have an impact on consumer happiness and drug marketing.Therefore, it is necessary to find a way to predict the actual quantity required for the organization's needs to avoid material spoilage and storage problems. A mathematical prediction model is required to assist any management in achieving the required availability of medicines for customers and safe storage of medicines. The research question is to design a system based on deep learning that can predict the amount of drugs required with high efficiency and accuracy based on the chronology of previous years.Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), Bidirectional LSTM, and Gated Recurrent Unit (GRU) are used to build prediction models. Those models allow for the optimization of inventory levels, thus reducing costs and potentially increasing sales. Various measures such as mean squared error (MSE), mean absolute squared error (MASE), root mean squared error (RMSE), and others are used to evaluate the prediction models. RNN model achieved the best result with MSE: 0.019 MAE: 0.102, RMSE: 0.0.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134973058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UNDERGROUND CRUDE OIL PIPELINE LEAKAGE DETECTION USING DEXINED DEEP LEARNING TECHNIQUES AND LAB COLOR SPACE 利用定义深度学习技术和实验室色彩空间进行地下原油管道泄漏检测
Pub Date : 2023-08-14 DOI: 10.25195/ijci.v49i2.418
Muhammad H. Obaid
Computer vision plays a big role in pipeline leakage detection systems and is one of the latest techniques. Still, it requires a powerful image-processing algorithm to detect objects. The purpose of this work is to develop and implement spill detection in oil pipes caused by leakage using images taken by a drone equipped with a Raspberry Pi 4. The acquired images are sent to the base station along with the global positioning system (GPS) location of the captured images via the message queuing telemetry transport Internet of Things (MQTT IoT) protocol. At the base station, images are processed to identify contours by dense extreme inception networks for edge detection(DexiNed) deep learning techniques based on holistically-nested edge detection(HED) and extreme inception (Xception) networks. This algorithm is capable of finding many contours in images. To find a contour with black color, the CIELAB color space (LAB) has been used. The proposed algorithm removes small contours and computes the area of the remaining contours. If the contour is above the threshold value, it is considered a spill; otherwise, it will be saved in a database for further inspection. For testing purposes, three different spill areas were implemented with spill sizes of (1 m^2,2 m^2 ,and 3 m^2). Images have been captured at three different heights (5 m, 10 m, and 15 m) by the drone used to capture the images. The result shows that effective detection has been obtained at 10 meters high. To monitor the entire system, a web application has been integrated into the base station.
计算机视觉在管道泄漏检测系统中起着重要的作用,是最新的检测技术之一。不过,它需要一个强大的图像处理算法来检测物体。这项工作的目的是利用配备树莓派4的无人机拍摄的图像,开发和实施漏油检测。通过消息队列遥测传输物联网(MQTT IoT)协议,将采集的图像与全球定位系统(GPS)位置一起发送到基站。在基站,通过密集的极限初始网络来处理图像以识别轮廓,用于边缘检测(dexine)基于整体嵌套边缘检测(HED)和极限初始(Xception)网络的深度学习技术。该算法能够在图像中发现许多轮廓。为了寻找带有黑色的轮廓,使用了CIELAB色彩空间(LAB)。该算法去除小轮廓并计算剩余轮廓的面积。如果轮廓线高于阈值,则认为是泄漏;否则,它将被保存在数据库中以供进一步检查。为了测试目的,我们采用了三个不同的泄漏区域,泄漏大小分别为(1m ^2、2m ^2和3m ^2)。用于捕获图像的无人机在三个不同的高度(5米,10米和15米)捕获了图像。结果表明,在10米的高度上,实现了有效的探测。为了监控整个系统,一个web应用程序已经集成到基站中。
{"title":"UNDERGROUND CRUDE OIL PIPELINE LEAKAGE DETECTION USING DEXINED DEEP LEARNING TECHNIQUES AND LAB COLOR SPACE","authors":"Muhammad H. Obaid","doi":"10.25195/ijci.v49i2.418","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.418","url":null,"abstract":"Computer vision plays a big role in pipeline leakage detection systems and is one of the latest techniques. Still, it requires a powerful image-processing algorithm to detect objects. The purpose of this work is to develop and implement spill detection in oil pipes caused by leakage using images taken by a drone equipped with a Raspberry Pi 4. The acquired images are sent to the base station along with the global positioning system (GPS) location of the captured images via the message queuing telemetry transport Internet of Things (MQTT IoT) protocol. At the base station, images are processed to identify contours by dense extreme inception networks for edge detection(DexiNed) deep learning techniques based on holistically-nested edge detection(HED) and extreme inception (Xception) networks. This algorithm is capable of finding many contours in images. To find a contour with black color, the CIELAB color space (LAB) has been used. The proposed algorithm removes small contours and computes the area of the remaining contours. If the contour is above the threshold value, it is considered a spill; otherwise, it will be saved in a database for further inspection. For testing purposes, three different spill areas were implemented with spill sizes of (1 m^2,2 m^2 ,and 3 m^2). Images have been captured at three different heights (5 m, 10 m, and 15 m) by the drone used to capture the images. The result shows that effective detection has been obtained at 10 meters high. To monitor the entire system, a web application has been integrated into the base station.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135308107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USING SPECIAL LETTERS AND DIACRITICS IN STEGANOGRAPHY IN HOLY QURAN 在《古兰经》中使用特殊字母和变音符进行隐写
Pub Date : 2023-08-14 DOI: 10.25195/ijci.v49i2.417
Nooruldeen Subhi Shakir, Mohammed Salih Mahdi
Because of the great development that took place in information transfer and communication technologies, the issue of information transfer security has become a very sensitive and resonant issue, great importance must be given to protecting this confidential information. Steganography is one of the important and effective ways to protect the security of this information while it is being transmitted through the Internet, steganography is a technology to hide information inside an unnoticeable envelope object that can be an image, video, text or sound. The Arabic language has some special features that make it excellent covers to hide information from Through the diversity of the Arabic letters from dotted letters in several forms or vowels or special letters, the Holy Qur’an is considered a cover rich in movements and Arabic grammar, which makes it a wide cover for the purpose of concealing information. The Holy Qur’an is a sacred book where it is not permissible to modify, add or move any of the letters or any diacritical mark to it. The algorithm hides the two bits by uses six special letters of Arabic language. Moreover, it checks for the presence of specific Arabic linguistic features referred Arabic diacritics. The proposed system achieved a high ability to hide as in Surat Al-Baqarah (4524 bits) and also (2576 bits) in Surat Al-Imran and in Surat Al-An’am (2318 bits).
由于信息传输和通信技术的飞速发展,信息传输安全问题已经成为一个非常敏感和引起共鸣的问题,必须高度重视对这些机密信息的保护。隐写术是保护信息安全的重要而有效的方法之一,当信息通过互联网传输时,隐写术是一种将信息隐藏在一个不明显的信封对象内的技术,可以是图像、视频、文本或声音。阿拉伯文有一些特殊的特点,这使它成为隐藏信息的绝佳掩护。阿拉伯文字母的多样性,从多种形式的虚线字母到元音字母或特殊字母,《古兰经》被认为是一个动作和阿拉伯语法丰富的掩护,这使它成为一个广泛的掩护,以隐藏信息。《古兰经》是一部不允许修改、增加或移动任何字母或任何变音符号的圣书。该算法通过使用阿拉伯语的六个特殊字母来隐藏这两个比特。此外,它还检查是否存在特定的阿拉伯语语言特征,即阿拉伯语变音符。该系统实现了Surat Al-Baqarah(4524比特)和Surat Al-Imran(2576比特)和Surat Al-An 'am(2318比特)的高隐藏能力。
{"title":"USING SPECIAL LETTERS AND DIACRITICS IN STEGANOGRAPHY IN HOLY QURAN","authors":"Nooruldeen Subhi Shakir, Mohammed Salih Mahdi","doi":"10.25195/ijci.v49i2.417","DOIUrl":"https://doi.org/10.25195/ijci.v49i2.417","url":null,"abstract":"Because of the great development that took place in information transfer and communication technologies, the issue of information transfer security has become a very sensitive and resonant issue, great importance must be given to protecting this confidential information. Steganography is one of the important and effective ways to protect the security of this information while it is being transmitted through the Internet, steganography is a technology to hide information inside an unnoticeable envelope object that can be an image, video, text or sound. The Arabic language has some special features that make it excellent covers to hide information from Through the diversity of the Arabic letters from dotted letters in several forms or vowels or special letters, the Holy Qur’an is considered a cover rich in movements and Arabic grammar, which makes it a wide cover for the purpose of concealing information. The Holy Qur’an is a sacred book where it is not permissible to modify, add or move any of the letters or any diacritical mark to it. The algorithm hides the two bits by uses six special letters of Arabic language. Moreover, it checks for the presence of specific Arabic linguistic features referred Arabic diacritics. The proposed system achieved a high ability to hide as in Surat Al-Baqarah (4524 bits) and also (2576 bits) in Surat Al-Imran and in Surat Al-An’am (2318 bits).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135308106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Cybercrime Using Social Media 利用社交媒体的网络犯罪调查
Pub Date : 2023-06-11 DOI: 10.25195/ijci.v49i1.404
Zainab Khyioon Abdalrdha, Abbas Mohsin Al-Bakry, Alaa K. Farhan
There is growing interest in automating crime detection and prevention for large populations as a result of the increased usage of social media for victimization and criminal activities. This area is frequently researched due to its potential for enabling criminals to reach a large audience. While several studies have investigated specific crimes on social media, a comprehensive review paper that examines all types of social media crimes, their similarities, and detection methods is still lacking. The identification of similarities among crimes and detection methods can facilitate knowledge and data transfer across domains. The goal of this study is to collect a library of social media crimes and establish their connections using a crime taxonomy. The survey also identifies publicly accessible datasets and offers areas for additional study in this area.
由于越来越多地使用社交媒体进行受害和犯罪活动,人们对大规模人口的自动化犯罪侦查和预防越来越感兴趣。这个领域经常被研究,因为它有可能使犯罪分子接触到大量的受众。虽然有几项研究调查了社交媒体上的具体犯罪,但仍缺乏一篇全面的综述论文,研究所有类型的社交媒体犯罪、它们的相似性和检测方法。识别犯罪和侦查方法之间的相似性可以促进跨领域的知识和数据传输。本研究的目的是收集一个社交媒体犯罪库,并使用犯罪分类法建立它们之间的联系。该调查还确定了可公开访问的数据集,并提供了在该领域进行进一步研究的领域。
{"title":"A Survey on Cybercrime Using Social Media","authors":"Zainab Khyioon Abdalrdha, Abbas Mohsin Al-Bakry, Alaa K. Farhan","doi":"10.25195/ijci.v49i1.404","DOIUrl":"https://doi.org/10.25195/ijci.v49i1.404","url":null,"abstract":"There is growing interest in automating crime detection and prevention for large populations as a result of the increased usage of social media for victimization and criminal activities. This area is frequently researched due to its potential for enabling criminals to reach a large audience. While several studies have investigated specific crimes on social media, a comprehensive review paper that examines all types of social media crimes, their similarities, and detection methods is still lacking. The identification of similarities among crimes and detection methods can facilitate knowledge and data transfer across domains. The goal of this study is to collect a library of social media crimes and establish their connections using a crime taxonomy. The survey also identifies publicly accessible datasets and offers areas for additional study in this area.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48819149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis Review: Optimal Trajectory for 6-DOF-based Intelligent Controller in Biomedical Application 基于6-DOF的智能控制器在生物医学应用中的最优轨迹分析综述
Pub Date : 2023-06-11 DOI: 10.25195/ijci.v49i1.405
Kian Raheem qasim, Yousif I. Al Mashhadany, Esam T. Yassen
With technological advancements and the development of robots have begun to be utilized in numerous sectors, including industrial, agricultural, and medical. Optimizing the path planning of robot manipulators is a fundamental aspect of robot research with promising future prospects. The precise robot manipulator tracks can enhance the efficacy of a variety of robot duties, such as workshop operations, crop harvesting, and medical procedures, among others. Trajectory planning for robot manipulators is one of the fundamental robot technologies, and manipulator trajectory accuracy can be enhanced by the design of their controllers. However, the majority of controllers devised up to this point were incapable of effectively resolving the nonlinearity and uncertainty issues of high-degree freedom manipulators in order to overcome these issues and enhance the track performance of high-degree freedom manipulators. Developing practical path-planning algorithms to efficiently complete robot functions in autonomous robotics is critical. In addition, designing a collision-free path in conjunction with the physical limitations of the robot is a very challenging challenge due to the complex environment surrounding the dynamics and kinetics of robots with different degrees of freedom (DoF) and/or multiple arms. The advantages and disadvantages of current robot motion planning methods, incompleteness, scalability, safety, stability, smoothness, accuracy, optimization, and efficiency are examined in this paper.
随着技术的进步和发展,机器人已经开始被应用于许多领域,包括工业、农业和医疗。机器人机械手路径规划优化是机器人研究的一个基本方面,具有广阔的发展前景。精确的机器人操纵轨道可以提高各种机器人任务的效率,例如车间操作,作物收获和医疗程序等。机器人机械手的轨迹规划是机器人的基本技术之一,通过对机械手控制器的设计可以提高机械手的轨迹精度。然而,目前设计的大多数控制器都不能有效地解决高自由度机械臂的非线性和不确定性问题,以克服这些问题,提高高自由度机械臂的轨迹性能。在自主机器人中,开发实用的路径规划算法以有效地完成机器人功能是至关重要的。此外,由于具有不同自由度(DoF)和/或多臂的机器人的动力学和动力学周围的复杂环境,结合机器人的物理限制设计无碰撞路径是一项非常具有挑战性的挑战。本文分析了现有机器人运动规划方法的优缺点、不完备性、可扩展性、安全性、稳定性、平滑性、准确性、优化性和高效性。
{"title":"An Analysis Review: Optimal Trajectory for 6-DOF-based Intelligent Controller in Biomedical Application","authors":"Kian Raheem qasim, Yousif I. Al Mashhadany, Esam T. Yassen","doi":"10.25195/ijci.v49i1.405","DOIUrl":"https://doi.org/10.25195/ijci.v49i1.405","url":null,"abstract":"With technological advancements and the development of robots have begun to be utilized in numerous sectors, including industrial, agricultural, and medical. Optimizing the path planning of robot manipulators is a fundamental aspect of robot research with promising future prospects. The precise robot manipulator tracks can enhance the efficacy of a variety of robot duties, such as workshop operations, crop harvesting, and medical procedures, among others. Trajectory planning for robot manipulators is one of the fundamental robot technologies, and manipulator trajectory accuracy can be enhanced by the design of their controllers. However, the majority of controllers devised up to this point were incapable of effectively resolving the nonlinearity and uncertainty issues of high-degree freedom manipulators in order to overcome these issues and enhance the track performance of high-degree freedom manipulators. Developing practical path-planning algorithms to efficiently complete robot functions in autonomous robotics is critical. In addition, designing a collision-free path in conjunction with the physical limitations of the robot is a very challenging challenge due to the complex environment surrounding the dynamics and kinetics of robots with different degrees of freedom (DoF) and/or multiple arms. The advantages and disadvantages of current robot motion planning methods, incompleteness, scalability, safety, stability, smoothness, accuracy, optimization, and efficiency are examined in this paper.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46968780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REVIEW ON DETECTION OF RICE PLANT LEAVES DISEASES USING DATA AUGMENTATION AND TRANSFER LEARNING TECHNIQUES 利用数据扩充和迁移学习技术检测水稻叶片病害研究进展
Pub Date : 2023-06-11 DOI: 10.25195/ijci.v49i1.381
Osama Alaa Hussein, Mohammed Salih Mahdi
The most important cereal crop in the world is rice (Oryza sativa). Over half of the world's population uses it as a staple food and energy source. Abiotic and biotic factors such as precipitation, soil fertility, temperature, pests, bacteria, and viruses, among others, impact the yield production and quality of rice grain. Farmers spend a lot of time and money managing diseases, and they do so using a bankrupt "eye" method that leads to unsanitary farming practices. The development of agricultural technology is greatly conducive to the automatic detection of pathogenic organisms in the leaves of rice plants. Several deep learning algorithms are discussed, and processors for computer vision problems such as image classification, object segmentation, and image analysis are discussed. The paper showed many methods for detecting, characterizing, estimating, and using diseases in a range of crops. The methods of increasing the number of images in the data set were shown. Two methods were presented, the first is traditional reinforcement methods, and the second is generative adversarial networks. And many of the advantages have been demonstrated in the research paper for the work that has been done in the field of deep learning.
世界上最重要的谷类作物是水稻。世界上一半以上的人口将其作为主食和能源。非生物和生物因素,如降水、土壤肥力、温度、害虫、细菌和病毒等,影响水稻的产量、产量和品质。农民花了大量的时间和金钱来管理疾病,他们使用了一种破产的“眼睛”方法,这导致了不卫生的农业做法。农业技术的发展极大地有利于水稻叶片中病原生物的自动检测。讨论了几种深度学习算法,并讨论了用于计算机视觉问题的处理器,如图像分类、对象分割和图像分析。这篇论文展示了在一系列作物中检测、表征、估计和使用疾病的许多方法。展示了增加数据集中图像数量的方法。提出了两种方法,第一种是传统的强化方法,第二种是生成对抗性网络。研究论文已经证明了在深度学习领域所做工作的许多优势。
{"title":"REVIEW ON DETECTION OF RICE PLANT LEAVES DISEASES USING DATA AUGMENTATION AND TRANSFER LEARNING TECHNIQUES","authors":"Osama Alaa Hussein, Mohammed Salih Mahdi","doi":"10.25195/ijci.v49i1.381","DOIUrl":"https://doi.org/10.25195/ijci.v49i1.381","url":null,"abstract":"The most important cereal crop in the world is rice (Oryza sativa). Over half of the world's population uses it as a staple food and energy source. Abiotic and biotic factors such as precipitation, soil fertility, temperature, pests, bacteria, and viruses, among others, impact the yield production and quality of rice grain. Farmers spend a lot of time and money managing diseases, and they do so using a bankrupt \"eye\" method that leads to unsanitary farming practices. The development of agricultural technology is greatly conducive to the automatic detection of pathogenic organisms in the leaves of rice plants. Several deep learning algorithms are discussed, and processors for computer vision problems such as image classification, object segmentation, and image analysis are discussed. The paper showed many methods for detecting, characterizing, estimating, and using diseases in a range of crops. The methods of increasing the number of images in the data set were shown. Two methods were presented, the first is traditional reinforcement methods, and the second is generative adversarial networks. And many of the advantages have been demonstrated in the research paper for the work that has been done in the field of deep learning.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42950939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Detection of Students' Abnormal Behavior in Online Exams Using Facial Landmarks in Conjunction with the YOLOv5 Models 结合YOLOv5模型的面部标志对在线考试学生异常行为的检测
Pub Date : 2023-06-11 DOI: 10.25195/ijci.v49i1.380
Muhanad Abdul Elah Alkhalisy, Saad Hameed Abid
The popularity of massive open online courses (MOOCs) and other forms of distance learning has increased recently. Schools and institutions are going online to serve their students better. Exam integrity depends on the effectiveness of proctoring remote online exams. Proctoring services powered by computer vision and artificial intelligence have also gained popularity. Such systems should employ methods to guarantee an impartial examination. This research demonstrates how to create a multi-model computer vision system to identify and prevent abnormal student behaviour during exams. The system uses You only look once (YOLO) models and Dlib facial landmarks to recognize faces, objects, eye, hand, and mouth opening movement, gaze sideways, and use a mobile phone. Our approach offered a model that analyzes student behaviour using a deep neural network model learned from our newly produced dataset" StudentBehavioralDS." On the generated dataset, the "Behavioral Detection Model" had a mean Average Precision (mAP) of 0.87, while the "Mouth Opening Detection Model" and "Person and Objects Detection Model" had accuracies of 0.95 and 0.96, respectively. This work demonstrates good detection accuracy. We conclude that using computer vision and deep learning models trained on a private dataset, our idea provides a range of techniques to spot odd student behaviour during online tests.
大规模在线开放课程(MOOCs)和其他形式的远程学习最近越来越受欢迎。学校和机构正在走向网络,以更好地为学生服务。考试的完整性取决于监考远程在线考试的有效性。由计算机视觉和人工智能驱动的监考服务也越来越受欢迎。这种制度应采用保证公正审查的方法。本研究演示了如何创建一个多模型计算机视觉系统来识别和预防考试中的异常学生行为。该系统使用You only look once (YOLO)模型和Dlib面部地标来识别人脸、物体、眼睛、手和嘴的张开动作,并注视侧面,使用手机。我们的方法提供了一个模型,该模型使用从我们新生成的数据集“学生行为”中学习到的深度神经网络模型来分析学生的行为。在生成的数据集上,“行为检测模型”的平均平均精度(mAP)为0.87,“张嘴检测模型”和“人和物体检测模型”的精度分别为0.95和0.96。这项工作证明了良好的检测精度。我们的结论是,使用计算机视觉和在私人数据集上训练的深度学习模型,我们的想法提供了一系列技术来发现在线测试中的奇怪学生行为。
{"title":"The Detection of Students' Abnormal Behavior in Online Exams Using Facial Landmarks in Conjunction with the YOLOv5 Models","authors":"Muhanad Abdul Elah Alkhalisy, Saad Hameed Abid","doi":"10.25195/ijci.v49i1.380","DOIUrl":"https://doi.org/10.25195/ijci.v49i1.380","url":null,"abstract":"The popularity of massive open online courses (MOOCs) and other forms of distance learning has increased recently. Schools and institutions are going online to serve their students better. Exam integrity depends on the effectiveness of proctoring remote online exams. Proctoring services powered by computer vision and artificial intelligence have also gained popularity. Such systems should employ methods to guarantee an impartial examination. This research demonstrates how to create a multi-model computer vision system to identify and prevent abnormal student behaviour during exams. The system uses You only look once (YOLO) models and Dlib facial landmarks to recognize faces, objects, eye, hand, and mouth opening movement, gaze sideways, and use a mobile phone. Our approach offered a model that analyzes student behaviour using a deep neural network model learned from our newly produced dataset\" StudentBehavioralDS.\" On the generated dataset, the \"Behavioral Detection Model\" had a mean Average Precision (mAP) of 0.87, while the \"Mouth Opening Detection Model\" and \"Person and Objects Detection Model\" had accuracies of 0.95 and 0.96, respectively. This work demonstrates good detection accuracy. We conclude that using computer vision and deep learning models trained on a private dataset, our idea provides a range of techniques to spot odd student behaviour during online tests.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47093407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LUNG CANCER DETECTION IN LOW-RESOLUTION IMAGES 肺癌在低分辨率图像中的检测
Pub Date : 2023-06-11 DOI: 10.25195/ijci.v49i1.378
Mostafa K .abd alrahman aladamey, Duha D .salman
One of the most important prognostic factors for all lung cancer patients is the accurate detection of metastases. Pathologists, as we all know, examine the body and its tissues. On the existing clinical method, they have a tedious and manual task. Recent analysis has been inspired by these aspects. Deep Learning (DL) algorithms have been used to identify lung cancer. The developed cutting-edge technologies beat pathologists in terms of cancer identification and localization inside pathology images. These technologies, though, are not medically feasible because they need a massive amount of time or computing capabilities to perceive high-resolution images. Image processing techniques are primarily employed for lung cancer prediction and early identification and therapy to avoid lung cancer. This research aimed to assess lung cancer diagnosis by employing DL algorithms and low-resolution images. The goal would be to see if Machine Learning (ML) models might be created that generate higher confidence conclusions while consuming fractional resources by comparing low and high-resolution images. A DL pipeline has been built to a small enough size from compressing high-resolution images to be fed into an or before CNN (Convolutional Neural Network) for binary classification i.e. cancer or normal. Numerous enhancements have been done to increase overall performance, providing data augmentations, including augmenting training data and implementing tissue detection. Finally, the created low-resolution models are practically incapable of handling extremely low-resolution inputs i.e. 299 x 299 to 2048 x 2048 pixels. Considering the lack of classification ability, a substantial reduction in models’ predictable times is only a marginal benefit. Due to an obvious drawback with the methodology, this is disheartening but predicted finding: very low resolutions, essentially expanding out on a slide, preserve only data about macro-cellular structures, which is usually insufficient to diagnose cancer by itself.
对所有肺癌患者来说,最重要的预后因素之一是准确检测转移灶。我们都知道,病理学家检查身体及其组织。在现有的临床方法上,它们具有繁琐和手工的任务。最近的分析受到了这些方面的启发。深度学习(DL)算法已被用于识别肺癌。开发的尖端技术在病理图像中的癌症识别和定位方面击败了病理学家。然而,这些技术在医学上是不可行的,因为它们需要大量的时间或计算能力来感知高分辨率图像。图像处理技术主要用于肺癌的预测和早期识别和治疗,以避免肺癌的发生。本研究旨在利用深度学习算法和低分辨率图像评估肺癌诊断。目标是看看是否可以创建机器学习(ML)模型,通过比较低分辨率和高分辨率图像来消耗部分资源,从而产生更高的置信度结论。通过压缩高分辨率图像,将深度学习管道构建到足够小的尺寸,然后将其输入CNN(卷积神经网络)之前进行二进制分类,即癌症或正常。为了提高整体性能,已经进行了许多增强,提供了数据增强,包括增强训练数据和实现组织检测。最后,创建的低分辨率模型实际上无法处理极低分辨率的输入,即299 x 299到2048 x 2048像素。考虑到缺乏分类能力,大幅减少模型的可预测时间只是一个边际效益。由于该方法有一个明显的缺陷,这是一个令人沮丧但却可以预见的发现:非常低的分辨率,基本上是在幻灯片上展开,只保留了关于宏观细胞结构的数据,这通常不足以单独诊断癌症。
{"title":"LUNG CANCER DETECTION IN LOW-RESOLUTION IMAGES","authors":"Mostafa K .abd alrahman aladamey, Duha D .salman","doi":"10.25195/ijci.v49i1.378","DOIUrl":"https://doi.org/10.25195/ijci.v49i1.378","url":null,"abstract":"One of the most important prognostic factors for all lung cancer patients is the accurate detection of metastases. Pathologists, as we all know, examine the body and its tissues. On the existing clinical method, they have a tedious and manual task. Recent analysis has been inspired by these aspects. Deep Learning (DL) algorithms have been used to identify lung cancer. The developed cutting-edge technologies beat pathologists in terms of cancer identification and localization inside pathology images. These technologies, though, are not medically feasible because they need a massive amount of time or computing capabilities to perceive high-resolution images. Image processing techniques are primarily employed for lung cancer prediction and early identification and therapy to avoid lung cancer. This research aimed to assess lung cancer diagnosis by employing DL algorithms and low-resolution images. The goal would be to see if Machine Learning (ML) models might be created that generate higher confidence conclusions while consuming fractional resources by comparing low and high-resolution images. A DL pipeline has been built to a small enough size from compressing high-resolution images to be fed into an or before CNN (Convolutional Neural Network) for binary classification i.e. cancer or normal. Numerous enhancements have been done to increase overall performance, providing data augmentations, including augmenting training data and implementing tissue detection. Finally, the created low-resolution models are practically incapable of handling extremely low-resolution inputs i.e. 299 x 299 to 2048 x 2048 pixels. Considering the lack of classification ability, a substantial reduction in models’ predictable times is only a marginal benefit. Due to an obvious drawback with the methodology, this is disheartening but predicted finding: very low resolutions, essentially expanding out on a slide, preserve only data about macro-cellular structures, which is usually insufficient to diagnose cancer by itself.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135005930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE USE OF ROUGH CLASSIFICATION AND TWO THRESHOLD TWO DIVISORS FOR DEDUPLICATION 粗分类和两阈值二除数在重复数据消除中的应用
Pub Date : 2023-06-11 DOI: 10.25195/ijci.v49i1.379
Hashem B. Jehlol, Loay E. George
The data deduplication technique efficiently reduces and removes redundant data in big data storage systems. The main issue is that the data deduplication requires expensive computational effort to remove duplicate data due to the vast size of big data. The paper attempts to reduce the time and computation required for data deduplication stages. The chunking and hashing stage often requires a lot of calculations and time. This paper initially proposes an efficient new method to exploit the parallel processing of deduplication systems with the best performance. The proposed system is designed to use multicore computing efficiently. First, The proposed method removes redundant data by making a rough classification for the input into several classes using the histogram similarity and k-mean algorithm. Next, a new method for calculating the divisor list for each class was introduced to improve the chunking method and increase the data deduplication ratio. Finally, the performance of the proposed method was evaluated using three datasets as test examples. The proposed method proves that data deduplication based on classes and a multicore processor is much faster than a single-core processor. Moreover, the experimental results showed that the proposed method significantly improved the performance of Two Threshold Two Divisors (TTTD) and Basic Sliding Window BSW algorithms.
在大数据存储系统中,重复数据删除技术可以有效地减少和去除冗余数据。主要问题是,由于大数据的巨大规模,数据重复删除需要昂贵的计算工作来删除重复数据。本文试图减少重复数据删除阶段所需的时间和计算量。分块和散列阶段通常需要大量的计算和时间。本文初步提出了一种利用重复数据删除系统并行处理的最佳性能的高效新方法。该系统旨在有效地利用多核计算。首先,该方法利用直方图相似度和k均值算法对输入进行粗略分类,去除冗余数据;其次,提出了一种计算类的除数列表的新方法,改进了分块方法,提高了重复数据删除率。最后,用三个数据集作为测试例,对所提方法的性能进行了评价。该方法证明了基于类和多核处理器的重复数据删除比单核处理器快得多。实验结果表明,该方法显著提高了两阈值两除数(TTTD)算法和基本滑动窗口BSW算法的性能。
{"title":"THE USE OF ROUGH CLASSIFICATION AND TWO THRESHOLD TWO DIVISORS FOR DEDUPLICATION","authors":"Hashem B. Jehlol, Loay E. George","doi":"10.25195/ijci.v49i1.379","DOIUrl":"https://doi.org/10.25195/ijci.v49i1.379","url":null,"abstract":"The data deduplication technique efficiently reduces and removes redundant data in big data storage systems. The main issue is that the data deduplication requires expensive computational effort to remove duplicate data due to the vast size of big data. The paper attempts to reduce the time and computation required for data deduplication stages. The chunking and hashing stage often requires a lot of calculations and time. This paper initially proposes an efficient new method to exploit the parallel processing of deduplication systems with the best performance. The proposed system is designed to use multicore computing efficiently. First, The proposed method removes redundant data by making a rough classification for the input into several classes using the histogram similarity and k-mean algorithm. Next, a new method for calculating the divisor list for each class was introduced to improve the chunking method and increase the data deduplication ratio. Finally, the performance of the proposed method was evaluated using three datasets as test examples. The proposed method proves that data deduplication based on classes and a multicore processor is much faster than a single-core processor. Moreover, the experimental results showed that the proposed method significantly improved the performance of Two Threshold Two Divisors (TTTD) and Basic Sliding Window BSW algorithms.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43927038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CASE STUDY FOR MIGRATION FROMON PREMISE TO CLOUD 从本地迁移到云的案例研究
Pub Date : 2019-12-30 DOI: 10.25195/20174523
Saif Q. Muhamed
{"title":"CASE STUDY FOR MIGRATION FROMON PREMISE TO CLOUD","authors":"Saif Q. Muhamed","doi":"10.25195/20174523","DOIUrl":"https://doi.org/10.25195/20174523","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44052651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Iraqi Journal for Computers and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1