Preferred Language
Articles
/
SBi7S5QBVTCNdQwCWATi
Molecular detection and the frequency of a pore-forming toxin in Enterococcus faecalis isolated from urinary tract infections
...Show More Authors

Crossref
View Publication
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detection of Nutrients and Major Ions at Al Muthanna Storage Site Soil
...Show More Authors

In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Fri Sep 24 2021
Journal Name
Indonesian Journal Of Chemistry
Molecular Imprinted of Nylon 6 for Selective Separation of Procaine by Solid-Phase Extraction
...Show More Authors

The study is based on the selective binding ability of the drug compound procaine (PRO) on a surface imprinted with nylon 6 (N6) polymer. Physical characterization of the polymer template was performed by X-ray diffraction and DSC thermal analysis. The imprinted polymer showed a high adsorption capacity to trap procaine (237 µg/g) and excellent recognition ability with an imprinted factor equal to 3.2. The method was applied to an extraction column simulating a solid-phase extraction to separate the drug compound in the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate more than the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate of more t

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
THE DIFFERENCE IN THE CHARGE DENSITY DISTRIBUTION OF 90Zr and 92Mo NUCLEI FROM ELASTIC ELECTRON SCATTERING
...Show More Authors

The calculation. of the nuclear. charge. density. distributions. ρ(r) and root. mean. square. radius.( RMS ) by elastic. electron. scattering. of medium. mass. nuclei. such. as (90Zr, 92Mo) based. on the model. of the modified. shell. and the use of the probability. of occupation. on the surface. orbits. of level 2p, 2s eroding. shells. and 1g gaining. shells. The occupation probabilities of these states differ noticeably from the predictions of the SSM. We have found. an improvement. in the determination. of ground. charge. density. and this improvement. allow. more precise. identification. of (CDD) between. (92Mo- 90Zr) to illustrate the influence of the extra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Morphological Study of Pollen Grains and Seeds in Eight Species from the Family Cruciferae in Iraq
...Show More Authors

The shape dimensions and characteristics of pollen grains and seeds have importance in distinguish among species. Therefore, the present study included morphological characteristics of pollen grains and seeds for eight species belonging to eight genera of the family Brassicaceae and these species are: Alliaria petiolata (M.Bieb) Cavara et Grand, Aubrieta parviflora Boiss, Cardamine hirsuta L., Crambe orientalis L., Eromobium aegyptiacum (Spreng.) Schweinf.et Asch.ex Boiss., Parlatoria cakiloidea Boiss., Sterigmostemum sulphureum (Banksetsol.) Bornm. Neotorularia torulosa (Desf.) Hedge & J. Leonard. The pollen grains were studied in morphological and full measurements were taken, the study showed that the majority of the pollen grai

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref