In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performance measures are used as a criterion to decide which classifier is the best one to detect the images with high accuracy. Eventually, the simulation results show that each classifier detect the damage/no damage image with different performance measures and then makes it easy to select the best one.
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThis paper presents experimental results regarding the behaviours of eight simply supported partially prestressed concrete beams with internally unbonded tendons, focusing particularly on the effect of three different variables: concrete compressive strength,
There are a lot of measures for Post Traumatic Stress Disorder (PTSD), but what distinguishes it from other measures is the number of short paragraphs and concise depending on the classification of American Psychiatric Association (APA), which can be applied by the researchers on a large number, Because the Iraqi society suffered from psychological trauma due to wars, conflicts and occupation and the resulting psychological disorders of the members of Iraqi society, especially post-traumatic stress disorder, as mentioned by many studies and researches.
Therefore, the aim of this study was to standardize the PTSD scale for students at Baghdad University. For the Psychologist Fua . E. which was applied in many foreign studies.
Multi-walled carbon nanotubes (MWCNTs) were functionalized by hexylamine (HA) in a promising, cost-effective, rapid and microwave-assisted approach. In order to decrease defects and remove acid-treatment stage, functionalization of MWCNTs with HA was carried out in the presence of diazonium reaction. Surface functionality groups and morphology of chemically-functionalized MWCNTS were characterized by FTIR, Raman spectroscopy, thermogravimetric analysis (DTG), and transmission electron microscopy (TEM). To reach a promising dispersibility in oil media, MWCNTs were functionalized with HA. While the cylindrical structures of MWCNTs were remained reasonably intact, characterization results consistently confirmed the sidewall-functionalization o
... Show MoreMH Hamzah, AF Abbas, International Journal of Early Childhood Special Education, 2022
The aim of this research to study.
The dimensions of organizational learning have been defined(learning dynamics, individuals empowerment, knowledge management and technology application) as well as the dimensions of learning organization have been defined (culture values, knowledge transfer, communication and employee characteristics), Asset completion questionnaire was used to collect data of this research from a purposely sample represent forty employees who works in Iraqi Planning Ministry at different positions. The research divided to four parts :
The first to the research methodology, the second to the theoretical review o
... Show MoreExperimental and numerical studies have been conducted for the effect of injected air bubbles on the heat transfer coefficient through the water flow in a vertical pipe under the influence of uniform heat flux. The investigated parameters were water flow rate of (10, 14 and 18) lit/min, air flow rate of (1.5, 3 and 4) lit/min for subjected heat fluxes of (27264, 36316 and 45398) W/m2. The energy, momentum and continuity equations were solved numerically to describe the motion of flow. Turbulence models k-ε was implemented. The mathematical model is using a CFD code Fluent (Ansys15). The water was used as continuous phase while the air was represented as dispersed. phase. The experimental work includes design, build and instrument a test
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show More