Preferred Language
Articles
/
0hYZsIsBVTCNdQwCcNY5
Detection of charcoal rot (Macrophomina phaseolina) toxin effects in soybean (Glycine max) seedlings using hyperspectral spectroscopy
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The effects of recently political transformations in changing democratic doing values in Iraq (( Theoretical – analytical vision between the reality and challenges ))
...Show More Authors

Iraq has confronted a huge political transformations after 2003 which resembled and presented rapid changes from totalitarian regime into democracy's system , this phenomenon has become a feature embodied in a new political system, specifically is being a price for previous deprivation and despotism .So that, the nature of political work has been changed as a result of practicing new democratic values ,but the real challenges appeared by depending on the conformity and political compromise in dealing with all of crises and problems in the political life .
The future of political work in this nascent democracy could be prepared according to fulfillment an active doings values stretched on national unity and forgiveness from one side ,t

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 13 2023
Journal Name
World Academy Of Sciences Journal
Potential effects of miR‑146 expression in relation to malondialdehyde as a biomarker for oxidative damage in patients with breast cancer
...Show More Authors

View Publication
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Wed Sep 20 2023
Journal Name
Journal Of Applied And Natural Science
Detection of some virulence genes (esp, agg, gelE, CylA) in Enterococcus faecalis isolated from different clinical cases at Baghdad
...Show More Authors

The virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo

... Show More
Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (66)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

View Publication
Scopus (66)
Crossref (47)
Scopus Clarivate Crossref