Applied Data Science and Analysis https://mesopotamian.press/journals/index.php/ADSA <p style="text-align: justify;">Applied Data Science and Analysis is a respected journal dedicated to real-world applications of data science. It provides a platform for experts to share innovative ideas and methodologies. Focused on bridging theory and practice, it showcases cutting-edge research and case studies in data analysis, machine learning, and more. Welcoming diverse contributions from fields like business, healthcare, and social sciences, the journal fosters collaboration among data professionals, aiming to advance the impact of data science in practical settings</p> en-US Wed, 27 Mar 2024 08:02:06 +0000 OJS 3.3.0.13 http://blogs.law.harvard.edu/tech/rss 60 Harnessing the Tide of Innovation: The Dual Faces of Generative AI in Applied Sciences; Letter to Editor https://mesopotamian.press/journals/index.php/ADSA/article/view/341 <p>Advancements in Artificial Intelligence (AI) and emerging generative capabilities added paradoxical aspects. One aspect is its positive impact and limitless power it brings to users. On the other hand, concerns about the misuse of this powerful tool have consistently increased [1]. AI advancements affect all domains and sectors as they evolve in their applicable nature in the applied sciences. The more powerful AI the more influence it has on the model workflow within the specific domain and its applied field [2]. This dual nature of generative AI ignited a wide discussion on implementation and produced a debate according to the latest employed tools and technologies by scientists and researchers.</p> A.S. Albahri, Idrees A. Zahid , Mohanad G. Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, Akhmed Kaleel Copyright (c) 2024 A.S. Albahri, Idrees A. Zahid , Mohanad G. Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, Akhmed Kaleel https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/341 Wed, 10 Jan 2024 00:00:00 +0000 Transforming Amazon's Operations: Leveraging Oracle Cloud-Based ERP with Advanced Analytics for Data-Driven Succes https://mesopotamian.press/journals/index.php/ADSA/article/view/449 <p><strong>Background:</strong> This research paper discusses a detailed exploration of Amazon's adoption of Oracle ERP Cloud, focusing on the strategic benefits of the implementation and the challenges and wider implications of implementing cloud-based ERP solutions within one of the world's largest and most complex enterprises. Further, it is detailed how, through a strict selection process, Amazon was led to settle for Oracle ERP Cloud from several leading ERP systems in the market. It also brings forth the criteria and evaluations at hand that guided this decision-making.</p> <h3>Method: This technique focuses on the phased rollout strategy, showing how Amazon brought the ERP system incrementally across departments, beginning with finance and procurement. It underlines the important role played by cross-functional teamwork, depicting efforts between finance, supply chain, HR, and IT teams to smooth implementation.</h3> <h3>Results: The study shows how deep technologies such as AI, machine learning, the Internet of Things, and blockchain are integrated into the ERP system. These go a long way to increase the decision-making ability and better operation of security, with improved transparency in Amazon; they provide it with real-time analytics, predictive insights, and improved transparency.</h3> <p><strong>Conclusion:</strong> Implementing Oracle ERP Cloud at Amazon sheds light on how scalable and cost-efficient cloud-based ERP solutions are. The availability of real-time data access and advanced analytics has spurred data-driven decision-making, but issues such as data migration and security require careful consideration in the planning process. This work provides valuable insights for enterprises seeking to implement similar ERP systems.</p> Tahsien Al-Quraishi, Osama A. Mahdi , Ali Abusalem , Chee Keong NG , Amoakoh Gyasi , Omar Al-Boridi , Naseer Al-Quraishi Copyright (c) 2024 Tahsien Al-Quraishi, Osama A. Mahdi , Ali Abusalem , Chee Keong NG , Amoakoh Gyasi , Omar Al-Boridi , Naseer Al-Quraishi https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/449 Wed, 10 Jul 2024 00:00:00 +0000 A Frequency-Domain Pattern Recognition Model for Motor Imagery-Based Brain-Computer Interface https://mesopotamian.press/journals/index.php/ADSA/article/view/437 <p>Brain-computer interface (BCI) is an appropriate technique for totally paralyzed people with a healthy brain. BCI based motor imagery (MI) is a common approach and widely used in neuroscience, rehabilitation engineering, as well as wheelchair control. In a BCI based wheelchair control system the procedure of pattern recognition in term of preprocessing, feature extraction, and classification plays a significant role in system performance. Otherwise, the recognition errors can lead to the wrong command that will put the user in unsafe conditions. The main objectives of this study are to develop a generic pattern recognition model-based EEG –MI Brain-computer interfaces for wheelchair steering control. In term of preprocessing, signal filtering, and segmentation, multiple time window was used for de-noising and finding the MI feedback. In term of feature extraction, five statistical features namely (mean, median, min, max, and standard deviation) were used for extracting signal features in the frequency domain. In term of feature classification, seven machine learning were used towards finding the single and hybrid classifier for the generic model. For validation, EEG data from BCI Competition dataset (Graz University) were used to validate the developed generic pattern recognition model. The obtained result of this study as the following: (1) from the preprocessing perspective it was seen that the two-second time window is optimal for extracting MI signal feedback. (2) statistical features are seen have a good efficiency for extracting EEG-MI features in the frequency domain. (3) Classification using (MLP-LR) is perfect in a frequency domain based generic pattern recognition model. Finally, it can be concluded that the generic pattern recognition model-based hybrid classifier is efficient and can be deployed in a real-time EEG-MI based wheelchair control system.</p> Z.T. Al-Qaysi , M. S Suzani , Nazre bin Abdul Rashid , Reem D. Ismail , M.A. Ahmed , Wan Aliaa Wan Sulaiman, Rasha A. Aljanabi Copyright (c) 2024 Z.T. Al-Qaysi , M. S Suzani , Nazre bin Abdul Rashid , Reem D. Ismail , M.A. Ahmed , Rasha A. Aljanabi, Mohd Arfian Ismail https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/437 Thu, 20 Jun 2024 00:00:00 +0000 An Innovative Method of Malicious Code Injection Attacks on Websites https://mesopotamian.press/journals/index.php/ADSA/article/view/397 <p>This paper provides a model to identify website vulnerability to Code Injection Attacks (CIAs). The proposed model identifies vulnerabilities to CIA of various websites, to check vulnerable to CIAs. The lack of existing models in providing checking against code injection has motivated this paper to present a new and enhanced model against web code injection attacks that uses SQL injections and Cross-Site Script (XSS) injections. This paper previews a self-checking protection model which enables web administrators to know whether their current protection program is adequate, or whether a website needs stronger protection against CIAs. The Automated Injection’s model is to check vulnerable to cod injection. The checking methodology consists of many intrusion methods that the attacker may use to launch code injection attacks. Methodology can give a high precision of CIA vulnerability checking for a website compared with other approaches (the minimum accuracy different between proposed approach and other approaches is 3.15%). CIAs can be a serious problem for vulnerable websites including stealing, deleting, or altering important data. Extensive experiments are conducted and compared with existing research [e.g. 1, 5, and 9] to study the effectiveness of the proposed model that can check whether a website is vulnerable to CIAs. The performance of the suggested approach has been tested on SQL injections and XSS injections. The studies showed that the detection rate of our model is 95.27%, and the false positive rate is 5.55%.</p> Hussein Alnabulsi , Rafiqul Islam , Izzat Alsmadi , Savitri Bevinakoppa Copyright (c) 2024 Hussein Alnabulsi , Rafiqul Islam , Izzat Alsmadi , Savitri Bevinakoppa https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/397 Mon, 20 May 2024 00:00:00 +0000 Deep Transfer Learning Model for EEG Biometric Decoding https://mesopotamian.press/journals/index.php/ADSA/article/view/391 <p>In automated systems, biometric systems can be used for efficient and unique identification and authentication of individuals without requiring users to carry or remember any physical tokens or passwords. Biometric systems are a rapidly developing and promising technology domain. in contrasting with conventional methods like password IDs. Biometrics refer to biological measures or physical traits that can be employed to identify and authenticate individuals. The motivation to employ brain activity as a biometric identifier in automatic identification systems has increased substantially in recent years. with a specific focus on data obtained through electroencephalography (EEG). Numerous investigations have revealed the existence of discriminative characteristics in brain signals captured during different types of cognitive tasks. However, because of their high dimensional and nonstationary properties, EEG signals are inherently complex, which means that both feature extraction and classification methods must take this into consideration. In this study, a hybridization method that combined a classical classifier with a pre-trained convolutional neural network (CNN) and the short-time Fourier transform (STFT) spectrum was employed. For tasks such as subject identification and lock and unlock classification, we employed a hybrid model in mobile biometric authentication to decode two-class motor imagery (MI) signals. This was accomplished by building nine distinct hybrid models using nine potential classifiers, primarily classification algorithms, from which the best one was finally selected. The experimental portion of this study involved, in practice, six experiments. For biometric authentication tasks, the first experiment tries to create a hybrid model. In order to accomplish this, nine hybrid models were constructed using nine potential classifiers, which are largely classification methods. Comparing the RF-VGG19 model to other models, it is evident that the former performed better. As a result, it was chosen as the method for mobile biometric authentication. The performance RF-VGG19 model is validated using the second experiment. The third experiment attempts for verifying the RF-VGG19 model's performance. The fourth experiment performs the lock and unlock classification process with an average accuracy of 91.0% using the RF-VGG19 model. The fifth experiment was performed to verify the accuracy and effectiveness of the RF-VGG19 model in performing the lock and unlock task. The mean accuracy achieved was 94.40%. Validating the RF-VGG19 model for the lock and unlock task using a different dataset (unseen data) was the goal of the sixth experiment, which achieved an accuracy of 92.8%. This indicates the hybrid model assesses the left and right hands' ability to decode the MI signal. Consequently, The RF-VGG19 model can aid the BCI-MI community by simplifying the implementation of the mobile biometric authentication requirement, specifically in subject identification and lock and unlock classification.</p> Rasha A. Aljanabi, Z.T. Al-Qaysi , M. S Suzani Copyright (c) 2024 Rasha A. Aljanabi, Z.T. Al-Qaysi , M. S Suzani https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/391 Wed, 28 Feb 2024 00:00:00 +0000 Optimal Time Window Selection in the Wavelet Signal Domain for Brain–Computer Interfaces in Wheelchair Steering Control https://mesopotamian.press/journals/index.php/ADSA/article/view/136 <p>Background and objective: Principally, the procedure of pattern recognition in terms of segmentation plays a significant role in a BCI-based wheelchair control system for avoiding recognition errors, which can lead to the initiation of the wrong command that will put the user in unsafe situations. Arguably, each subject might have different motor-imagery signal powers at different times in the trial because he or she could start (or end) performing the motor-imagery task at slightly different time intervals due to differences in the complexities his or her brain. Therefore, the primary goal of this research is to develop a generic pattern recognition model (GPRM)-based EEG-MI brain-computer interface for wheelchair steering control. Additionally, having a simplified and well generalized pattern recognition model is essential for EEG-MI based BCI applications. Methods: Initially, bandpass filtering and segmentation using multiple time windows were used for denoising the EEG-MI signal and finding the best duration that contains the MI feature components. Then, feature extraction was performed using five statistical features, namely the minimum, maximum, mean, median, and standard deviation, were used for extracting the MI feature components from the wavelet coefficient. Then, seven machine learning methods were adopted and evaluated to find the best classifiers. Results: The results of the study showed that, the best durations in the time-frequency domain were in the range of (4-7 s). Interestingly, the GPRM model based on the LR classifier was highly accurate, and achieved an impressive classification accuracy of 85.7%.</p> Z.T. Al-Qaysi , M. S Suzani , Nazre bin Abdul Rashid , Rasha A. Aljanabi, Reem D. Ismail , M.A. Ahmed , Wan Aliaa Wan Sulaiman , Harish Kumar Copyright (c) 2024 Z.T. Al-Qaysi , M. S Suzani , Nazre bin Abdul Rashid , Rasha A. Aljanabi, Reem D. Ismail , M.A. Ahmed , Wan Aliaa Wan Sulaiman , Harish Kumar https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/136 Sat, 15 Jun 2024 00:00:00 +0000 Is LiFi Technology Ready for Manufacturing and Adoption? An End-user questionnaire-based study https://mesopotamian.press/journals/index.php/ADSA/article/view/448 <p>Because of the exponential development of emerging technologies and the increase of devices that use the internet, the wireless fidelity (WiFi) spectrum has been saturated, therefore, the light fidelity (LiFi) has been under development for wireless communication including internet access. LiFi network systems can provide high speed data rates with high security. However, LiFi is still under development and research, and is not yet popular for end-users to be used in homes, companies, and other industries. Therefore, for the first time, this study investigates the adoption probability of LiFi technology by the end-users to anticipate the success rate when launching ready-to-use LiFi devices for end-users by the manufacturer companies. A well-designed questionnaire is used in this study for data collection. A total of 100 participants from around the world have been chosen to fill-up the questionnaire forms including three phases:&nbsp; basic information, preferences, and usage, and LiFi and Pricing. The findings of this study show a high and positive probability for adoption rate of LiFi technology. However, the pricing aspect has a critical impact on the acceptance of using LiFi systems by the end-users.</p> Sallar Salam Murad, Rozin Badeel ; Rehem A. Ahmed Copyright (c) 2024 Sallar Salam Murad, Rozin Badeel ; Rehem A. Ahmed https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/448 Fri, 05 Jul 2024 00:00:00 +0000 Advanced Ensemble Classifier Techniques for Predicting Tumor Viability in Osteosarcoma Histological Slide Images https://mesopotamian.press/journals/index.php/ADSA/article/view/405 <p><strong>Background:</strong> Osteosarcoma is considered as the primary malignant tumor of the bone, emanating from primitive mesenchymal cells that form osteoid or immature bone. Accurate diagnosis and classification play a key role in management planning to achieve improved patient outcomes. Machine learning techniques may be used to augment and surpass existing conventional methods towards an analysis of medical data.</p> <p><strong>Methods:</strong> In the present study, the combination of feature selection techniques and classification methods was used in the development of predictive models of osteosarcoma cases. The techniques include L1 Regularization (Lasso), Recursive Feature Elimination (RFE), SelectKBest, Tree-based Feature Importance, while the following classification methods were applied: Voting Classifier, Decision Tree, Naive Bayes, Multi-Layer Perceptron, Random Forest, Logistic Regression, AdaBoost, and Gradient Boosting. Some model assessment was done by combining metrics such as accuracy, precision, recall, F1 score, AUC, and V score.</p> <p><strong>Results:</strong> The combination of the Tree-Based Feature Importance for feature selection and Voting Classifier with Decision Tree Classifier proved to be giving a higher performance compared to all other combinations, where such combinations helped in correct classification of positive instances and wonderful minimization of false positives. Other combinations also gave significant performances but slightly less effective, for example, L1 Regularization with the Voting Classifier, RFE with the Voting Classifier.</p> <p><strong>Conclusion:</strong> This work presents strong evidence that advanced machine learning with ensemble classifiers and robust feature selection can result in overall improvement of the diagnostic accuracy and robustness for the classification of osteosarcoma. Research on class imbalance and computational efficiency will be its future research priority.</p> Tahsien Al-Quraishi , Chee Keong NG , Osama A. Mahdi , Amoakoh Gyasi, Naseer Al-Quraishi Copyright (c) 2024 Tahsien Al-Quraishi , Chee Keong NG , Osama A. Mahdi , Amoakoh Gyasi, Naseer Al-Quraishi https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/405 Wed, 29 May 2024 00:00:00 +0000 Big Data Predictive Analytics for Personalized Medicine: Perspectives and Challenges https://mesopotamian.press/journals/index.php/ADSA/article/view/395 <p>The integration of predictive analytics into personalized medicine has become a promising approach for improving patient outcomes and treatment efficacy. This paper provides a review of the field, examining the tools, methodologies, and challenges associated with this advanced statistical methodology. Predictive analytics leverages machine learning algorithms to analyze vast datasets, including Electronic Health Records (EHRs), genomic data, medical imaging, and real-time data from wearable devices. The review explores key tools such as the Hadoop Distributed File System (HDFS), Apache Spark, and Apache Hive, which facilitate scalable storage, efficient data processing, and comprehensive data analysis. Key challenges identified include managing the immense volume of healthcare data, ensuring data quality and integration, and addressing privacy and security concerns. The paper also highlights the difficulties in achieving real-time data processing and integrating predictive insights into clinical practice. Effective data governance and ethical considerations are critical to maintaining trust and transparency. The strategic use of big data tools, combined with investment in skill development and interdisciplinary collaboration, is essential for harnessing the full potential of predictive analytics in personalized medicine. By overcoming these challenges, healthcare providers can enhance patient care, optimize resource management, and drive medical discoveries, ultimately revolutionizing healthcare delivery on a global scale.</p> Tahsien Al-Quraishi, Naseer Al-Quraishi, Hussein AlNabulsi, Hussein AL-Qarishey, Ahmed Hussein Ali Copyright (c) 2024 Tahsien Al-Quraishi, Naseer Al-Quraishi, Hussein AlNabulsi, Hussein AL-Qarishey, Ahmed Hussein Ali https://creativecommons.org/licenses/by/4.0 https://mesopotamian.press/journals/index.php/ADSA/article/view/395 Thu, 11 Apr 2024 00:00:00 +0000