Preferred Language
Articles
/
9BdPS5ABVTCNdQwCG4XI
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Dec 19 2025
Journal Name
Journal Of Systems Science And Mathematical Sciences
SCREENING TESTS FOR DISEASE RISK HAPLOTYPE SEGMENTS IN GENOME BY USE OF PERMUTATION
...Show More Authors

The haplotype association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease.Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls.It starts with inferring haplotypes from genotypes followed by a haplotype co-classification and marginal screening for disease-associated haplotypes.Unfortunately,phasing uncertainty may have a strong effects on the haplotype co-classification and therefore on the accuracy of predicting risk haplotypes.Here,to address the issue,we propose an alternative approach:In Stage 1,we select potential risk genotypes inste

... Show More
View Publication
Publication Date
Fri Mar 04 2022
Journal Name
Pakistan Journal Of Medical And Health Science
Detection of aadA1 and aac(3)-1V resistance genes in Acinetobacter baumannii
...Show More Authors

Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
DETECTION OF BACTERIAL INFECTIONS AND THEIR RESISTANCE IN BURN WOUND OF SKIN
...Show More Authors

Scopus
Publication Date
Tue Jun 30 2020
Journal Name
Iraq Journal Of Market Research And Consumer Protection
DETECTION OF HEAVY METALS POLLUTION INTYPES OF MILK SAMPLES IN BAGHDAD MARKETS
...Show More Authors

View Publication
Crossref
Publication Date
Wed Feb 03 2016
Journal Name
Nanoscience And Nanotechnology
Fabrication of Functionalize Reduce Graphene Oxide and Its Application in Ampicillin Detection
...Show More Authors

Graphene oxide (GO) was prepared from graphite (GT) with Hammer method, the GO was reduced with hydrazine hydrate to produce a reduced graphene oxide (RGO). The RGO was reacted with thiocarbohydrazide (TCH) to functionalize the RGO with 4-amino-3-symbol-1h-1, 2, 4-triazol-5 (4H) –thion group and to obtain (RGOT). All the prepared nanomaterial and the product of the functionalization RGOT were characterized with Fourier transformer infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) analysis. RGOT mixed with ultrasonic device at different pH values of phosphate buffer solution (PBS), the mixture used to modifying a screen printed carbon electrodes SPCE and with cyclic voltammetry the sensitivity of selectivity of the new modifying elect

... Show More
Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Molecular Detection and Antiserum Preparation of Begomoviruses Infecting Zucchini Squash in Iraq
...Show More Authors
Abstract<p>Begomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV) <italic>Begomovirus solanumpalampurense</italic>, Squash leaf curl virus (SLCuV) <italic>B. cucurbitapeponis</italic> and Tomato yellow leaf curl virus (TYLCV) <italic>B. </italic></p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
مجلة الأطروحة العلمية المحكمة-العلوم الصرفة والتطبيقية
Detection of Lead (Pb) and Cadmium (Cd) Concentrations in Some Indomie Samples
...Show More Authors

Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 02 2021
Journal Name
International Journal Of Pharmaceutical Research
Detection of Kaposi’s Associated Herpesvirus in Saliva of Drug Related Immunosupressed Patient
...Show More Authors

View Publication
Crossref