Preferred Language
Articles
/
9BdPS5ABVTCNdQwCG4XI
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Fri Mar 06 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Building HEC-RAS model to detect the areas of Water Cycle Interruption in river stream and their sections
...Show More Authors

The purpose of this paper is to build a simulation model by using HEC-RAS software to simulate the reality of water movement in the main river of Basra City (South of Iraq) which is known as Siraji-Khoura River. The main objective of the simulation is to detect areas where the water cycle is interrupted in some stations of the river stream, as this river has become an outlet for the disposal of sewage, leading to pollution and causing weakness in some sections of the river & obstructing the water cycle that takes place between this river and Shatt al – Arab river. A field survey data of the river and its banks were adopted to derive the grades, longitudinal and cross sections of the river, these data included three-dimensional coordinates

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The impact of concentrations of inorganic salts to compromise in rooting branches Genuine apples and apple architecture in vitro
...Show More Authors

Took apple branches Genuine and Architecture tissue cultured in vitro 3 cm long and planted in the middle of food MS that contains different concentrations of inorganic salts and of Mntmat free growth and incubated Transplanter to study their effect on rooting Aalavra

View Publication Preview PDF
Publication Date
Sat Aug 12 2017
Journal Name
Journal Of Engineering
Prepare rules spatial data for soils and the Calculation of an Area in Iraq for Industrial Purposes using Geographic Information Systems (GIS)
...Show More Authors

 
      The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Artistic Integration of Aesthetic Manifestations in the Andalusian Islamic Style into the Interior Architecture (Mansour Laalaj's Door / Meknes a Case Study): شهريار عبد القادر محمود -سعد جرجيس
...Show More Authors

The Islamic architectural heritage constitutes a civilized fortune that has to be preserved and protected and work should be done to maintain its development to be more convenient for the circumstances of the age and the civilization transformations. Due to the fact that architecture represents the civilization pot and cultural identity, its originality has to be preserved and work has to be done to prevent the strange architectural invasion that changes its character and make it lose the identity and the character and detached from its roots and environment.    

Decoration, in the interior design, as a concept is connected to ornamentation process of interior spaces, which is a process of adding certain items

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Jun 30 2025
Journal Name
Iraqi Journal Of Science
New Weighted Synthetic Oversampling Method for Improving Credit Card Fraud Detection
...Show More Authors

The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th

... Show More
View Publication
Scopus Crossref