Research Article
Open Access
A Comparative Analysis of Python Code-Line Bug-Finding Methods
Yasmin Makki Mohialdenq,
Nadia Mahmood Hussien,
Esraa Jaffar Baker,
Kapil Joshi
Abstract

Download PDF
Python is a well-known programming language in many fields, including building websites, technical computing, machine learning and data analysis. However, Python does have faults that may prevent it from operating as intended. Defects must be found and fixed for Python code to function at its best. This essay offers a comparative examination of several Python code bug-finding methods. This study aims to assess these approaches' efficacy and efficiency in locating defects at the level of specific code lines. The relevance of bug identification and its effect on Python programs are briefly discussed in the first section of the article. Then it examines several methods for finding bugs, like testing procedures, static analysis and dynamic analysis. There is a detailed discussion of each approach's benefits, constraints and use cases.
Research Article
Open Access
Cloud-Based Digital Watermarking Model for Medical Image Integrity
Ethar Abdul Wahhab Hachim,
Yasmin Makki Mohialden
Abstract

Download PDF
In cloud environments, data authentication serves the purpose of verifying the data's integrity and validity. The prevalence of data dispersion and sharing in cloud systems often leads to frequent occurrences of manipulation, theft and loss. The use of various techniques for validating data ownership and ensuring its validity in the absence of physical access contributes significantly to enhancing data authentication and security. The use of digital watermarking has the potential to authenticate medical images that are stored and sent in a cloud environment. Digital watermarking involves embedding a watermark onto a picture while preserving its visual appearance. The verification of image integrity and provenance may be achieved by the use of authentication data included in this watermark. This study aims to ascertain the identification and authentication of patient medical images saved in the cloud. Firstly, it is necessary to analyze the impact of watermarking methods on data optimization. Furthermore, identifying an optimal watermarking technique for incorporating watermark data into medical images will enhance the authentication process while simultaneously ensuring a harmonious equilibrium between resilience and image quality. The proposed watermarking technology demonstrated effective performance when applied to various medical pictures inside a cloud computing environment, substantiating its efficacy.
Research Article
Open Access
Selecting The Most Appropriate Type of Connection to Transmit the Necessary Amount of Flight Information on the Air to Ground Path
Al Kadhimi Ali Noori Mohammed,
Zaidoon Khalaf Mahmood
Abstract

Download PDF
The article selects the type of connection of the aircraft to the towers of cellular operators. An analysis is made of the most suitable types of modems that meet the requirements of the 101st ICAO Amendment.
Review Article
Open Access
Islanding Detection in Distributed Generation Grids Using Recurrent Neural Networks
Osman N. Ucan,
Sarah Mahmood Farhan Alkinani
Abstract

Download PDF
Renewable Energy, Power Grids, Fossil Fuel, Local Grids, Simple RNN
Research Article
Open Access
Deep Transfer Learning for Automated Detection of Developmental Dysplasia of the Hip in X-ray Images
Abstract

Download PDF
Developmental dysplasia of the hip (DDH) is a common musculoskeletal disorder that affects infants and young children. Early detection of DDH is crucial for effective treatment and prevention of long-term complications. In this study, we investigate the effectiveness of deep transfer learning techniques for automated DDH detection in X-ray images, conducting a comparative analysis of various deep learning models. A comprehensive dataset of anonymized X-ray images of hips, comprising both normal and dysplastic cases, was utilized. The dataset was preprocessed to enhance image quality and ensure consistency. Pre-trained Convolutional Neural Network (CNN) models, including VGGNet, ResNet and InceptionV3, were fine-tuned using the dataset to adapt them for DDH detection. The performance of the deep transfer learning models was evaluated based on accuracy, sensitivity, specificity and area under the receiver operating characteristic curve (AUC-ROC). Robustness to variations in image quality and noise was also assessed through data augmentation techniques. The results demonstrated that the deep transfer learning models achieved promising performance in detecting DDH in X-ray images. The models exhibited high accuracy, sensitivity and specificity, indicating their potential for reliable and efficient automated DDH screening. ResNet outperformed the other models, achieving the highest AUC-ROC score. Furthermore, the models showed robustness to variations in image quality and noise, indicating their applicability in real-world scenarios. Data augmentation techniques further improved the models' performance and generalization ability. This study establishes deep transfer learning as a valuable tool for automated DDH detection in X-ray images. The high performance and robustness of the models provide a foundation for developing computer-aided diagnostic systems, aiding in timely and accurate diagnosis of DDH, facilitating early intervention and improving patient outcomes. Future research can explore the application of deep transfer learning to other musculoskeletal disorders and its integration into clinical practice for supporting healthcare decision-making.
Research Article
Open Access
Reviewing Organized Cybercrime: A Global Perspective on Cyber Security
Muna Abdul Hussain Radhi,
Nadia Mahmood Hussien,
Yasmin Makki Mohialden
Despite the difficulty in defining crimes such as cybercrime and organized crime, the international community has not determined a simple method for measuring these new offenses. This is due to their inability to limit and control the characteristics of these new crimes to acquire comprehensive data. This could be due to the different perspectives on crime held by wealthy and developing nations, each with distinct economic and financial interests. The advancement of technology has resulted in the development of new instruments, inventions and services in various fields. Due to technological transformation, a new type of transaction has emerged: Electronic transactions. In terms of occurrence and operation, they differ from traditional commerce. As nations conduct more business with one another and their economies become more globalized, culture and crime have also become more globalized. This has resulted in the emergence of dangerous organizations that operate on a global and organized scale, cross international borders and extend across multiple nations. They employ specific plans and partnerships between criminal groups from various nations to gain control of other countries. Cybercrime has become a natural phenomenon due to the increasing prevalence of electronic and third-generation services. The number of crimes has increased from a smattering to thousands. Most of these crimes involve intimate matters, making individuals more susceptible. Under the guise of technology, fraud, defamation, identity theft and extortion are among the offenses that have entered Iraqi society. These are brand-new crimes with fictitious motives but their victims are genuine individuals who have suffered financial losses. Therefore, we have chosen to compose this paper to explain the nature and implications of electronic crime. It seeks to draw the attention of law enforcement officials to this new social phenomenon in the field of crime, highlight its risks and losses and increase public awareness of this form of corruption so that individuals can be cautious. This research will examine the significant obstacles nations confront in this field. Despite the difficulty of defining crimes such as electronic and organized crime, the international community has not arrived at a precise method for measuring these new offenses. They could not restrict and control the characteristics of these new crimes to compile them exhaustively. This research paper will examine organized electronic crime's essential characteristics and applications.
Research Article
Open Access
The Effect of ZCR on Enhanced Speech Compression Method
ZCR, NLMS, lossy compression, Speech Compression, Huffman Encoding
Research Article
Open Access
ESP32-WiFi Network Smart Monitoring System
Aysar Thamer Naser Tuaimah
ESP32, temperature and humidity; DH11, alarm. Chatbot, Telegram bot
Research Article
Open Access
Use of a Gradient Boosting Algorithm to Accurately Predict Solutions to Complex Equations
Doaa Muhsin Abd Ali,
Yasmin Makki Mohialde,
Nadia Mahmood Hussien
Gradient Boosting algorithm, complex equations, Evaluation Metrics, Symbolic Equations, Coefficients
Research Article
Open Access
Person Identification based on Iris Recognition and CNN
Ali Hussein Hamed,
Assist Prof. Dr. Asmaa Sadiq
Iris Recognition, Hough Transformation, CNN, Deep learning, Biometric Identification.
Research Article
Open Access
Optimization of logistics and supply chain processes through AI in Salesforce
Salesforce, Automation, Supply chain, Logistics, CRM, Einstein Analysis
Research Article
Open Access
Exploitation of Cloud Computing Applications in Health Care
cloud computing, health care, case sheet, medical history, surgical history.
Research Article
Open Access
Anomaly-based Network Intrusion Detection System for IoT using Deep Learning Model
Anomaly-based Network IoT, DDoS, (CNN)
Research Article
Open Access
Detecting Spam on images using Back Propagation Neural Network and Natural Language Processing
Text detection, Text Recognition, Back Propagation Neural Network, AI, Image Spam and optical character recognition, Natural Language Processing.
Research Article
Open Access
Salt Creeping: A Major Challenge for Oilfields, A Review
Ali Nahi Abed,
Armin Hosseinian
salt creeping, stuck pipe, casing failure, rock mechanics, salt formations, casing ovality.
Research Article
Open Access
Nearly Maximal Projective Modules
Nada K. Abdullah,
Summer W. Omar
Nearly maximal projective modules. F.G.nearly maximal projective modules, V-ring, SV-ring and QF-ring