Preferred Language
Articles
/
HBZNj4oBVTCNdQwCl5-B
The Use of Gradient Based Features for Woven Fabric Images Classification
...Show More Authors

Crossref
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Building a High Accuracy Transfer Learning-Based Quality Inspection System at Low Costs
...Show More Authors

      Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.       In this research, we pr

... Show More
Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Sensing And Bio-sensing Research
Hydrogen peroxide biosensor based on hemoglobin-modified gold nanoparticles–screen printed carbon electrode
...Show More Authors

View Publication
Scopus (38)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
The optimal utilization of lighting factor in the flat photobioreactor for biological applications
...Show More Authors

Distribution of light intensity in the flat photobioreactor for microalgae cultivation as a step design for production of bio-renewable energy was addressed in the current study. Five sizes of bioreactors with specific distances from the main light source were adopted as independent variables in experiential design model. The results showed that the bioreactor’s location according to the light source, determines the nature of light intensity distribution in the reactor body. However, the cross-section area plays an important role in determining the suitable location of reactor to achieve required light homogeneity. This area could change even the expected response of the light passing through the reactor if Beer-Lambert's law is adopted.

... Show More
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Nov 03 2002
Journal Name
University Of Baghdad
Parametric Study Of The Optimum Wing - Canard Configuration For The Swept Forward Fighter
...Show More Authors

The aerodynamic characteristics of the forward swept wing aircraft have been studied theoretically and an experimentally investigation for the wake field generated by this configuration have been carried out. Low order panel method with the Dirichlet boundary condition have been used to solve the case of the steady, inviscid and compressible flow. Two different panel method techniques have been employed: the source-doublet and the doublet method. The thickness for the various components was considered in the study. Prandtl-Glauert similarity rule has been used to account for the compressibility effects. Experimentally, a model was manufactured from wood with body length (290mm) and main wing span was (204mm). The primary objective of th

... Show More
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
College Of Engineering Journal
Study the Effect of Cutting Conditions for turning process on the Machined Surface
...Show More Authors

Surfaces quality is one of the most specified customer requirements for machine parts. The major indication of surfaces quality on machined parts is surface roughness. The research aim is to study the cutting conditions and their effects on the surface roughness. This paper utilizes regression models to predict surface roughness over the machining time for variety of cutting conditions in turning. In the experimental part for turning, different types of materials (Aluminum alloy, Copper alloy, and Gray cast iron) were considered with different cutting speed ( ) and feed rate ( ). A mathematical Model depending on statistical-mathematical method between surface roughness (Rz ) and cutting condition ( , ) were derived, for the three materials

... Show More
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The political role of social movements In Iraq for the period 2003-2014
...Show More Authors

The phenomenon of the social movements of researchers, based on the scope of their influence on political events, and the nature of the wide role played, and its ability to influence, through its activities and various activities and various. It has practiced its activities through new and non-traditional peaceful means, with clear slogans and specific objectives. And was able to mobilize activists from different strata of the Iraqi people, and its categories and social strata. As the demands focused on freedoms, rights, dignity and social justice

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 13 2024
Journal Name
The International Journal Of Oral & Maxillofacial Implants
The Accuracy of Intraoral Registration for Dynamic Surgical Navigation in the Edentulous Maxilla
...Show More Authors

Purpose: Despite the high clinical accuracy of dynamic navigation, inherent sources of error exist. The purpose of this study was to improve the accuracy of dynamic navigated surgical procedures in the edentulous maxilla by identifying the optimal configuration of intra-oral points that results in the lowest possible registration error for direct clinical implementation. Materials and methods: Six different 4-area configurations were tested by 3 operators against positive and negative controls (8-areas and 3-areas, respectively) using a skull model. The two dynamic navigation systems (X-Guide® and NaviDent®) and the two registration methods (bone surface tracing and fiducial markers) produced four registration groups. The accuracy of the

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref