Preferred Language
Articles
/
Wxf9Q48BVTCNdQwCYmhX
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
...Show More Authors

Crossref
View Publication
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Natural Convection Heat Transfer in an Inclined Open-Ended Square Cavity with Partially Active Side Wall
...Show More Authors

This paper reports a numerical study of flow behaviors and natural convection heat transfer characteristics in an inclined open-ended square cavity filled with air. The cavity is formed by adiabatic top and bottom walls and partially heated vertical wall facing the opening. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. A computer program to solve mathematical model has been developed and written as a code for MATLAB software. Results in the form of streamlines, isotherms, and average Nusselt number, are obtained for a wide range of Rayleigh numbers 103-106 with Prandtl number 0.71

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Analytical Methods
Determination of pharmaceuticals in freshwater sediments using ultrasonic-assisted extraction with SPE clean-up and HPLC-DAD or LC-ESI-MS/MS detection
...Show More Authors

A robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.

View Publication
Scopus (21)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
A Recognition System for Subjects' Signature Using the Spatial Distribution of Signature Body
...Show More Authors

This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Damage Detection and Assessment of Stiffness and Mass Matrices in Curved Simply Supported Beam Using Genetic Algorithm
...Show More Authors

In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Rawaa Emad Jaloud And Fadia Falahfadia Falah
Isolation and Identification of Fungal Propagation in Iraqi Meat and Detection of Aflatoxin B1 Using ELISA Technique
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Detection of Pseudomonas aeruginosa in Clinical Samples Using PCR Targeting ETA and gyrB Genes
...Show More Authors

Pseudomonas aeruginosa has variety of virulence factors that contribute to its pathogenicity. Therefore, rapid detection with high accuracy and specificity is very important in the control of this pathogenic bacterium. To evaluate the accuracy and specificity of Polymerase Chain Reaction (PCR) assay, ETA and gyrB genes were targeted to detect pathogenic strains of P. aeruginosa. Seventy swab samples were taken from patients with infected wounds and burns in two hospitals in Erbil and Koya cities in Iraq. The isolates were traditionally identified using phenotypic methods, and DNA was extracted from the positive samples, to apply PCR using the species specific primers targeting ETA, the gene encoding for exotoxin A, and gyrB gene. The res

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis
...Show More Authors

The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.

This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Mon Dec 06 2021
Journal Name
Iraqi Journal Of Science
Detecting and Monitoring the Vegetal Cover of Karbala Province (Iraq) Using Change Detection Methods
...Show More Authors

Karbala province was one of the most important areas in Iraq and considered an
economic resource of vegetation such as trees of fruits, sieve and other vegetation.
This research aimed to utilize change detection for investigating the current
vegetation cover at last three decay. The main objectives of this research are collect
a group of studied area (Karbala province) satellite images in sequence time for
the same area, these image captured by Landsat (TM 1995, ETM+ 2005 and
Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such as atmosphere
correction and rectification has been done. Mosaic model between the parts of
studied area was performing. Gap filling consider being very important step has
be

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Epileptic Seizures Detection Using DCT-II and KNN Classifier in Long-Term EEG Signals
...Show More Authors

     Epilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of  one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref