Preferred Language
Articles
/
Chd7sJIBVTCNdQwCkr54
Robotic-assisted magnetic resonance imaging ultrasound fusion results in higher significant cancer detection compared to cognitive prostate targeting in biopsy naive men
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF SOME BIOChEMICAL LEVELS IN THE SERUM OF PROFESSORS EXPOSED TO CHEMICALS IN THE LABORATORIES OF THE UNIVERSITY OF SAMARRA: EVALUATION OF SOME BIOChEMICAL LEVELS IN THE SERUM OF PROFESSORS EXPOSED TO CHEMICALS IN THE LABORATORIES OF THE UNIVERSITY OF SAMARRA
...Show More Authors

A chemical study was carried out to evaluate the efficiency of the liver enzyme concertation and uric acid level and its antagonists in the serum of the professors exposed to chemicals in the laboratories of the University of Samarra and their comparison with the healthy people. The research included 25 samples of the exposed professors and 20 samples as a group of officers.

              The results of the current study showed a significant increase in the level of   AST, ALT in the serum of professors exposed to chemicals compared to healthy people. The results showed no significant increase in

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
ABO Blood Type in Relation in Relation to Caries Experience and Salivary Physicochemical Characteristic among College Students at Al-Diwania Governorate in Iraq
...Show More Authors

Background: (ABO) Blood type have an effect on general health including oral health as salivary physicochemical characteristics differ among different type of blood and as consequence these affect the severity of dental caries. The aim of the present study is an assessment of the prevalence of caries experience among different blood type in relation to salivary physicochemical characteristic. Materials and Methods: Two hundred and fifty females' college students in Al-Qadisyia University aged 18 years old were selected on random basis; they were divided to four groups according to their blood type, Dental experience was diagnosed and recorded according to DMFs (Mülemman, 1976) Index, this allows recording decayed lesion by severity. A su

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Analytical Study of Mathematics Textbooks in the Basic Education Stage in the Sultanate of Oman According to NCTM Standards
...Show More Authors

The present study aimed to identify the availability of the National Council of Teachers of Mathematics (NCTM) standards in the content of mathematics textbooks at the basic education stage in the Sultanate of Oman. The study used the descriptive-analytical approach, adopting the method of content analysis through using a content analysis tool that included (43) indicators distributed on the four NCTM standards related to the field of geometry, after verifying their validity and reliability. The study population consisted of mathematics textbooks (first and second semesters) for ninth-grade students in the Sultanate of Oman in the academic year 2018/2019, while the sample consisted of Geometry units in the content of those books, which a

... Show More
View Publication Preview PDF