Preferred Language
Articles
/
Gha1oooBVTCNdQwCD6L3
Detection of lukf-pv gene in Staphylococcus aureus isolated from pregnant women with Urinary tract infection
...Show More Authors

Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (57)
Crossref (57)
Scopus Clarivate Crossref
Publication Date
Sun Jun 10 2012
Journal Name
Journal Of Environmental And Occupational Science
The resistance of locally isolated Serratia marcescens to heavy metals chlorides and optimization of some environmental factors
...Show More Authors

Summary The aim of this study is the evaluation the resistance of S. marcescence obtained from soil and water to metals chlorides (Zn+2, Hg+2, Fe+2, Al+3, and Pb+2). Four isolates, identified as Serratia marcescence and S. marcescena (S4) were selected for this study according to their resistance to five heavy metals. The ability of S. marcescena (S4) to grow in different concentrations of metals chloride (200-1200 µg/ml) was tested, the highest concentration that S. marcescence (S4) tolerate was 1000 µg/ml for Zn+2, Hg+2, Fe+2, AL+3, pb+2 and 300 µg/ml for Hg+2 through 24 hrs incubation at 37 Co. The effects of temperature and pH on bacteria growth during 72 hrs were also studied. S. marcescence (S4) was affected by ZnCl2, PbCl2, FeC12

... Show More
Publication Date
Sat Jun 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Periodontal health status in relation to physicochemical characteristics of saliva among pre-menopausal and post-menopausal women in Baghdad city-Iraq
...Show More Authors

Background: Menopause can bring oral health problems and also associated with significant adverse changes in the orofacial complex. After menopause, women become more susceptible to periodontal disease due to deficiency of estrogen hormone. Current study aimed to evaluate the periodontal health status in relation to salivary constituent including pH, flow rate and some elements (Magnesium, Calcium and inorganic phosphorus) of pre and post-menopause women. Materials and Methods: Periodontal health status of 52 women aged 48-50 years old (26 pre-menopause and 26 post-menopause) were examined including (gingival index, plaque index, calculus index, probing pocket depth and clinical attachment level). Salivary sample was collected for two women

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Oral health knowledge and practices of women attending dental clinics of Baghdad University
...Show More Authors

Background: Knowledge is considered to be essential for developing healthy practices and preventing the main oral diseases. In some developing countries, women were at higher risk to develop these diseases. This study was conducted to evaluate women’s dental knowledge and practices through a specific questionnaire and the relationship with patient’s educational level and the number of their children. Subjects and method: Women, aged from 25-35 years old, were selected to participate in the current study. They were attending dental clinics in the teaching hospital of Baghdad University. Each participant was instructed to answer questionnaire sheet which is previously prepared in Arabic language by the authors. The total numb

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Indian Journal Of Natural Sciences
Detection of the Main Mycotoxins in Feed of Horses in Al-Zawra'a Park and Study their Effects on Hematological Feature
...Show More Authors

Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 08 2024
Journal Name
Journal Of Microbiology, Biotechnology And Food Sciences
SYNERGISTIC EFFECTS OF NEEM OIL AND GENTAMICIN ON PSEUDOMONAS AERUGINOSA VIA PHZM GENE DOWNREGULATION: A COMPREHENSIVE REVIEW
...Show More Authors

Exploring the antibacterial potential of neem oil (Azadirachta indica) in combination with gentamicin (GEN) against pathogenic molds, especially Pseudomonas aeruginosa, has drawn concern due to the quest for natural treatment options against incurable diseases. Prospective research directions include looking for natural cures for many of the currently incurable diseases available now. microbial identification system, were used to identify the isolates. The research utilized a range of methods, such as the diffusion agar well (AWD) assays, TEM (transmission electron microscopy) analysis, minimum inhibitory concentration (MIC) assays, and real-time PCR (RT-qPCR) to analyze bacterial expression and the antibacterial action of neem oil (Azadira

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF