Preferred Language
Articles
/
IIYtroYBIXToZYAL0aRH
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Using of Index Biological Integrity of Phytoplankton (P-IBI) in the Assessment of Water Quality in Don River Section
...Show More Authors

       The multimetric Phytoplankton Index of Biological Integrity (P-IBI) was applied throughout Rostov on Don city (Russia) on 8 Locations in Don River from April – October 2019. The P-IBI is composed from seven metrics: Species Richness Index (SRI), Density of Phytoplankton and total biomass of phytoplankton and Relative Abundance (RA) for blue-green Algae, Green Algae, Bacillariophyceae and Euglenaphyceae Algae. The average P-IBI values fell within the range of (45.09-52.4). Therefore, water throughout the entire study area was characterized by the equally "poor" quality. Negative points of anthropogenic impact detected at the stations are: Above the city of Rostov-on-Don (1 km, higher duct Aksai) was 38.57 i

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering/
Water quality assessment and total dissolved solids prediction using artificial neural network in Al-Hawizeh marsh south of Iraq
...Show More Authors

The Iraqi marshes are considered the most extensive wetland ecosystem in the Middle East and are located in the middle and lower basin of the Tigris and Euphrates Rivers which create a wetlands network and comprise some shallow freshwater lakes that seasonally swamped floodplains. Al-Hawizeh marsh is a major marsh located east of Tigris River south of Iraq. This study aims to assess water quality through water quality index (WQI) and predict Total Dissolved Solids (TDS) concentrations in Al-Hawizeh marsh based on artificial neural network (ANN). Results showed that the WQI was more than 300 for years 2013 and 2014 (Water is unsuitable for drinking) and decreased within the range 200-300 in years 2015 and 2016 (Very poor water). The

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Early detection of breast cancer mass lesions by mammogram segmentation images based on texture features
...Show More Authors

Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti

... Show More
View Publication Preview PDF
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Enhancement in Lubricating, Rheological, and Filtration Properties of Unweighted Water-Based Mud Using XC Polymer NPs
...Show More Authors

In this research, an enhancement in lubricating, rheological, and filtration properties of unweighted water-based mud is fundamentally investigated using XC polymer NPs with 0.2gm, 0.5gm, 1gm, 2gm, and 4gm concentrations. Bentonite, that had been used in the preparation of unweighted water-based mud, was characterized using XRF-1800 Sequential X-ray Fluorescence Spectrometer, XRD-6100/7000 X-ray Diffractometer, and Malvern Mastersizer 2000 particle size analyzer, respectively. Lubricating, rheology and filtration properties of unweighted water-based mud were measured at room temperature (35°C) using OFITE EP and Lubricity Tester, OFITE Model 900 Viscometer, and OFITE Low-Pressure Filter Press, respectively. XC Polymer N

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Use of chickpea soaking water in dough fermentation and its effect on quality properties of loaf bread
...Show More Authors

This study was carried out to investigate the possibility of chickpea soaked water as a substitute for yeast in dough fermentation and its effects on sensory properties of the laboratory loaf bread. Chickpea was soaked for 24,48 and 72 hours at room temperature and used in proportion with or without yeast in dough fermentation . The results revealed that , as the percentage of soaked chickpea water substitution increased, the volume of the produced loaf bread decreased as compared with the control treatment (only yeast ).Best results were obtained by using soaked chickpea water for 24 hours in proportion of 1:1 soaked chickpea water : yeast regarding the sensory properties ,volume and leavening of the loaf bread.
Keywords: chickpea so

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Effect of alternate water quality irrigation on pore sizes distribution during drainage in clay loam texture soil
...Show More Authors

Scopus (2)
Scopus