Preferred Language
Articles
/
IRZjgYcBVTCNdQwCsFRv
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Effect of Successive Convolution Layers to Detect Gender
...Show More Authors

Image classification can be defined as one of the most important tasks in the area of machine learning. Recently, deep neural networks, especially deep convolution networks, have participated greatly in end-to-end learning which reduce need for human designed features in the image recognition like Convolution Neural Network. It is offers the computation models which are made up of several processing layers for learning data representations with several abstraction levels. In this work, a pre-trained deep CNN is utilized according to some parameters like filter size, no of convolution, pooling, fully connected and type of activation function which includes 300 images for training and predict 100 image gender using probability measures. Re

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Brain Sciences
Robust EEG Based Biomarkers to Detect Alzheimer’s Disease
...Show More Authors

Biomarkers to detect Alzheimer’s disease (AD) would enable patients to gain access to appropriate services and may facilitate the development of new therapies. Given the large numbers of people affected by AD, there is a need for a low-cost, easy to use method to detect AD patients. Potentially, the electroencephalogram (EEG) can play a valuable role in this, but at present no single EEG biomarker is robust enough for use in practice. This study aims to provide a methodological framework for the development of robust EEG biomarkers to detect AD with a clinically acceptable performance by exploiting the combined strengths of key biomarkers. A large number of existing and novel EEG biomarkers associated with slowing of EEG, reductio

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Mefenamic Acid Selective Membranes Sensor and Its Application to pharmaceutical Analysis
...Show More Authors

PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
A Modified Approach by Using Prediction to Build a Best Threshold in ARX Model with Practical Application
...Show More Authors

The proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.

In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Using 2D Resistivity Imaging Technique to Detect and Delineate Shallow Unknown Cavities In Al-Haqlaniyah Area, Western Iraq
...Show More Authors

      Basal breccia unconformity layer between Anah and Euphrates Formations in Al-Haqlaniyah area, Western desert, include enormous sinkholes and cavities usually cause severe damages to any kind of engineering facilities built over it. Two-dimensional resistivity imaging has been applied to detect the depth and extent of the subsurface caves at five stations. The dipole-dipole array is chosen with an electrode spacing of 2 meters. 2D Dipole-dipole imaging inverse models show the resistivity values have a big variation between the anomalous background resistivity of rocks and part of cavities. These models showed shallow cavities at 1 to 3 m depth and others at 5to 6 m depth and extending to a depth of 23 m. The unconformity layer

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Feature Extraction in Six Blocks to Detect and Recognize English Numbers
...Show More Authors

    The Fuzzy Logic method was implemented to detect and recognize English numbers in this paper. The extracted features within this method make the detection easy and accurate. These features depend on the crossing point of two vertical lines with one horizontal line to be used from the Fuzzy logic method, as shown by the Matlab code in this study. The font types are Times New Roman, Arial, Calabria, Arabic, and Andalus with different font sizes of 10, 16, 22, 28, 36, 42, 50 and 72. These numbers are isolated automatically with the designed algorithm, for which the code is also presented. The number’s image is tested with the Fuzzy algorithm depending on six-block properties only. Groups of regions (High, Medium, and Lo

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Gulf Economist
The Bayesian Estimation in Competing Risks Analysis for Discrete Survival Data under Dynamic Methodology with Application to Dialysis Patients in Basra/ Iraq
...Show More Authors

Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 08 2025
Journal Name
Journal Of Administration And Economics
Using dynamic Fuzzy programming to control the storage of some Department of Commerce stores
...Show More Authors

In this research was to use the method of classic dynamic programming (CDP) and the method of fuzzy dynamic programming (FDP) to controlling the inventory in N periods and only one substance ,in order to minimize the total cost and determining the required quantity in warehouse rusafa principal of the ministry of commerce . A comparison was made between the two techniques، We found that the value of fuzzy total cost is less than that the value of classic total cost

View Publication