Preferred Language
Articles
/
7hYg5IsBVTCNdQwCH-Mp
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the improved algorithm can detect this type of anomaly. Thus, our approach is effective in finding abnormalities.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Artificial Intelligent Models for Detection and Prediction of Lost Circulation Events: A Review
...Show More Authors

Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
PROPERTIES OF HARDENED CONCRETE USING CRUSHED CLAY BRICK AS AGGREGATES
...Show More Authors

This paper provides the result of an investigation to use of crushed clay brick as
aggregates in producing concrete. Eight different crushed clay brick aggregate concretes were
used in this investigation. Compressive strength, splitting tensile strength and pulse velocity of
crushed clay brick aggregates concrete were determined and compare to natural aggregate
concrete. The compressive strength of crushed clay brick aggregates concretes were always
lower than the compressive strength of natural aggregates concrete regardless the age of
concrete, but the crushed clay brick aggregates concrete showed better performance as the age of
concrete increases and average reduction in compressive strength were 33.5% at the age

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Preparation of polymer thin film using as NH3 gas Sensor
...Show More Authors

Polyaniline organic Semiconductor polymer thin films have been prepared by oxidative polymerization at room temperature, this polymer was deposited on glass substrate with thickness 900nm, FTIR spectra was tested , the structural,optical and electrical properties were studied through XRD ,UV-Vis ,IR measurements ,the results was appeared that polymer thin film sensing to NH3 gas.

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Nauchforum
THE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
...Show More Authors

THE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)

Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
American Standard Code for Information Interchange mapping technique for text hiding in the RGB and gray images
...Show More Authors

Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
The problem of overlapping concepts in the interpretive practices of literary text (The texts of Shakespeare model)
...Show More Authors

The scientific studies that deal with Herminutia (interpretation) as the art of reading the interpretation practiced by the recipient after his understanding of the literary texts and works of art that he sees or read them so that these readings to make the act of reading and allow him the opportunity to mature and rational reflection of each text or artistic work.

Based on this, the researchers considered the establishment of the problem of their research through the search for the problematic overlap of concepts in the interpretive practices of the literary text?

The second chapter dealt with the definition of the term interpretation as well as interpretation as a theory and concept, and then the indicators reached by t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 29 2023
Journal Name
Geomatics And Environmental Engineering
Challenges and Issues in Spatial Data Infrastructure (SDI) Development in Iraq
...Show More Authors

This paper addresses the nature of Spatial Data Infrastructure (SDI), considered as one of the most important concepts to ensure effective functioning in a modern society. It comprises a set of continually developing methods and procedures providing the geospatial base supporting a country’s governmental, environmental, economic, and social activities. In general, the SDI framework consists of the integration of various elements including standards, policies, networks, data, and end users and application areas. The transformation of previously paper-based map data into a digital format, the emergence of GIS, and the Internet and a host of online applications (e.g., environmental impact analysis, navigation, applications of VGI dat

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Scopus Crossref