Preferred Language
Articles
/
GRZZgYcBVTCNdQwCHFQg
Reducing False Notification in Identifying Malicious Application Programming Interface (API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis

Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Effect of Successive Convolution Layers to Detect Gender

Image classification can be defined as one of the most important tasks in the area of machine learning. Recently, deep neural networks, especially deep convolution networks, have participated greatly in end-to-end learning which reduce need for human designed features in the image recognition like Convolution Neural Network. It is offers the computation models which are made up of several processing layers for learning data representations with several abstraction levels. In this work, a pre-trained deep CNN is utilized according to some parameters like filter size, no of convolution, pooling, fully connected and type of activation function which includes 300 images for training and predict 100 image gender using probability measures. Re

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
A Modified Approach by Using Prediction to Build a Best Threshold in ARX Model with Practical Application

The proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.

In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete

... Show More
Scopus (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Using 2D Resistivity Imaging Technique to Detect and Delineate Shallow Unknown Cavities In Al-Haqlaniyah Area, Western Iraq

      Basal breccia unconformity layer between Anah and Euphrates Formations in Al-Haqlaniyah area, Western desert, include enormous sinkholes and cavities usually cause severe damages to any kind of engineering facilities built over it. Two-dimensional resistivity imaging has been applied to detect the depth and extent of the subsurface caves at five stations. The dipole-dipole array is chosen with an electrode spacing of 2 meters. 2D Dipole-dipole imaging inverse models show the resistivity values have a big variation between the anomalous background resistivity of rocks and part of cavities. These models showed shallow cavities at 1 to 3 m depth and others at 5to 6 m depth and extending to a depth of 23 m. The unconformity layer

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Gulf Economist
The Bayesian Estimation in Competing Risks Analysis for Discrete Survival Data under Dynamic Methodology with Application to Dialysis Patients in Basra/ Iraq

Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 24 2024
Journal Name
Journal Of Administration And Economics
Using dynamic Fuzzy programming to control the storage of some Department of Commerce stores

In this research was to use the method of classic dynamic programming (CDP) and the method of fuzzy dynamic programming (FDP) to controlling the inventory in N periods and only one substance ,in order to minimize the total cost and determining the required quantity in warehouse rusafa principal of the ministry of commerce . A comparison was made between the two techniques، We found that the value of fuzzy total cost is less than that the value of classic total cost

View Publication
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Feature Extraction in Six Blocks to Detect and Recognize English Numbers

    The Fuzzy Logic method was implemented to detect and recognize English numbers in this paper. The extracted features within this method make the detection easy and accurate. These features depend on the crossing point of two vertical lines with one horizontal line to be used from the Fuzzy logic method, as shown by the Matlab code in this study. The font types are Times New Roman, Arial, Calabria, Arabic, and Andalus with different font sizes of 10, 16, 22, 28, 36, 42, 50 and 72. These numbers are isolated automatically with the designed algorithm, for which the code is also presented. The number’s image is tested with the Fuzzy algorithm depending on six-block properties only. Groups of regions (High, Medium, and Lo

... Show More
Scopus (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Automatic Identification of Ear Patterns Based on Convolutional Neural Network

Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in

... Show More
Scopus Crossref
View Publication
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
View Publication Preview PDF