Preferred Language
Articles
/
JBYRU4cBVTCNdQwC1UXb
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performance measures are used as a criterion to decide which classifier is the best one to detect the images with high accuracy. Eventually, the simulation results show that each classifier detect the damage/no damage image with different performance measures and then makes it easy to select the best one.

Scopus Crossref
View Publication
Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use of Logistic Regression Model in Estimating the Probability of Being Affected By Breast Cancer Based On the Levels of Interleukins and Cancer Marker CA15-3
...Show More Authors

Breast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o

... Show More
View Publication
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program Based on Employing the Educational Portal in Developing the Skills of the Administrative Body in Basic Education Schools in Dhofar Governorate
...Show More Authors

The objective of the study was to identify the effectiveness of a training program based on the employment of the educational portal in the development of the skills of the administrative body in the basic education schools in Dhofar Governorate. To achieve the goal, a training program was designed that includes the skills of the educational portal to be met by the administrative body and measuring its effectiveness. A questionnaire to identify training needs, and a notecard to evaluate performance. The study sample consisted of (70) individuals of the administrative staff. The researchers used the descriptive-analytical method to identify the training needs, design and build the training program and the experimental method for applying

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Science And Nature
On KU-semigroups
...Show More Authors

Inˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.

Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
on subliminal cryotography
...Show More Authors

in recent years cryptography has played a big role especially in computer science for information security block cipher and public

View Publication Preview PDF
Publication Date
Tue Jan 01 2002
Journal Name
Iraqi Journal Of Science
On Regular Modules
...Show More Authors

Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.

Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Γ-n-Derivations on Semigroup Ideals on Prime Γ-Near-Rings
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On maps of Γ -period 2 on prime Γ- near-rings
...Show More Authors

We present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Numerical Investigation of Natural Convection Heat Transfer in Partially Filled Porous Enclosure Subjected to Constant Heat
...Show More Authors

Steady natural convection in a square enclosure with wall length (L= 20 cm) partially filled by saturated porous medium with same fluid (lower layer) and air (upper layer) is investigated. The conceptual study of the achievements of the heat transfer is performed under effects of bottom heating by constant heat flux (q=150,300,450,600W/m2 ) for three heaters size (0.2,0.14,0.07)m with symmetrically cooling with constant temperature on two vertical walls and adiabatic top wall. The relevant filled studied parameters are four different porous medium heights (Hp=0.25L,0.5L, 0.75L, L), Darcey number (Da1) 3.025×10-8 and (Da2) 8.852×10-4 ) and Rayleigh number range (60.354 - 241.41), (1.304×106 – 5.2166×106 ) for Da1 and Da2 cases respecti

... Show More
Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between the Methods Estimate Nonparametric and Semiparametric Transfer Function Model in Time Series Using Simulation
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees21gr
Theoretical investigation of charge transfer at N3 sensitized molecule dye contact with TiO2 and ZnO semiconductor
...Show More Authors

We present a simple model of charge transfer current through sensitizer N3 molecule contact to TiO2 and ZnO semiconductors to calculate the charge transfer current. The model underlying depends on the fundamental parameters of the charge transfer reaction and it is based on the quantum transition theory approach. A transition energy, driving energy and potential barrier have been taken into account charge transfer current at N3 / TiO2 and N3 / ZnO devices with wide polarity solvents Acetic acid, 2-Methoxyethanol, 1-Butanol, Methyl alcohol, chloroform, N,N-Dimethylacetamide and Ethyl alcohol via the quantum donor-acceptor system.The effects of the transition energy and potential barrier are computed and discussion on charge transfer current.

... Show More
View Publication Preview PDF
Scopus Crossref