Preferred Language
Articles
/
NRYJRocBVTCNdQwCMUAw
Morphometric Analysis of the Mental Foramen Variation in an Iraqi Population by Using Cone-Beam Computed Tomography
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Significance and Conservation of Birds of the Genus of Bee-eater (MEROPS) in Uzbekistan
...Show More Authors

The purpose of this article is to identify and evaluate the importance of birds of the genus Merops (European Bee-eater -Merops apiaster and Blue-cheeked Bee-eater -Merops persicus) in Uzbekistan, as well as to develop recommendations aimed at solving some problems associated with its conservation. As a result of the study, in the aspect of biocenotic relations, the natural significance of these species was revealed. The economic value is determined and analyzed in beekeeping farms. From the study of the remains of food contained in the stomachs, throats and nests of M.apiaster, a preliminary list of the main species of the food spectrum has been compiled. Based on the bioacoustic repellent "Korshun-8"

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Nov 13 2019
Journal Name
Al-kindy College Medical Journal
Outcome Of Surgical Treatment Of Tuberculosis Of The Spine In Patients With Motor Deficits
...Show More Authors

Background: Significant numbers of patients with spinal tuberculosis (TB), especially in developing countries, still present late after disease onset with severe neurological deficits.

Objective:This study was conducted to assess the outcome of surgery in patients with tuberculosis of the spine with motor deficits.

Type of the study: Retrospective study.

Methods: We retrospectively analyzed data obtained in all the patients with severe motor deficits due to spinal TB admitted to and surgically treated in four hospitals in Baghdad/Iraq during the period from January 2012 to January 2014. History, examination, imaging, histological, postoperative, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Re-distribution of income in favor of the poor - theoretical entrance of stagnation treatment
...Show More Authors

Research deals the crises of the global recession of the facets of different and calls for the need to think out of the ordinary theory and find the arguments of the theory to accommodate the evolution of life, globalization and technological change and the standard of living of individuals and the size of the disparity in income distribution is not on the national level, but also at the global level as well, without paying attention to the potential resistance for thought the usual classical, Where the greater the returns of factors of production, the consumption will increase, and that the marginal propensity to consume may rise and the rise at rates greater with slices of low-income (the mouths of the poor) wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Using VGG Models with Intermediate Layer Feature Maps for Static Hand Gesture Recognition
...Show More Authors

A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering Science And Technology
Air entrained vortex occurrence at sump for inclined multiple intake pipes using cfd
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Trajectory Tracking Control for a Wheeled Mobile Robot Using Fractional Order PIaDb Controller
...Show More Authors

Nowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order  PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to  torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Face Recognition and Emotion Recognition from Facial Expression Using Deep Learning Neural Network
...Show More Authors
Abstract<p>Face recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.</p>
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More