Preferred Language
Articles
/
XRgbYZQBVTCNdQwCZxSu
Detection Of Biofilm Formation By Beta- Lactam Resistance Klebsiella Pneumoniae Isolated From Clinical Specimens And Aquatic Samples
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Edge Detection Using Circular Sliding Window
...Show More Authors

    In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.

View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iraqi Journal Of Physics
Assessment of the Natural Radioactivity Levels of Soil Samples in IT1 Oil Reservoirs in Kirkuk City, Northeast Iraq
...Show More Authors

In this study, gamma-ray spectrometry with an HPGe detector was used to measure the specific activity concentrations of 226Ra, 232Th, and 40K in soil samples collected from IT1 oil reservoirs in Kirkuk city, northeast Iraq. The “spectral line Gp” gamma analysis software package was used to analyze the spectral data. 226Ra specific activity varies from 9  0.34 Bq.kg-1 to 17  0.47 Bq.kg-1. 232Th specific activity varies from 6.2  0.08 Bq.kg-1 to 18  0.2 Bq.kg-1. 40K specific activity varies from 25  0.19 Bq.kg-1 to 118  0.41 Bq.kg-1. The radiological hazard due to the radiation emitted from natural r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Approaches to the formation of a contemporary explanatory mindset: Critical inductive study
...Show More Authors

The issue of the development of Qur'anic studies for the tasks, and the first thought of minds and multiple understandings, and the most precious ideas, and the alternatives were floated, and varied visions, especially as we live in an era exploding knowledge, and complicate secretions, and scramble his ideas, and to devise intellectual approaches To achieve the witnesses of civilization in the words of the Almighty (to be martyrs on the people) Surat Al - Baqarah / 143 attendance and participation in the achievement and a positive interaction with the participants of humanity and civilization in the light of the meaning (to know) rooms / 13.
Therefore, we must emerge from the one-dimensional view of the Koran to the complex mindset t

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 09 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Safety Profile of Biological Drugs in Clinical Practice: A Retrospective Pharmacovigilance Study
...Show More Authors

Biological drugs have an active substance that is made by a living organism or derived from a living organism. They are one of the important therapy options used in a wide range of diseases especially life-threatening diseases. Biological therapy opens new opportunities for treating different diseases for which drug therapy is minimal, but they have considerable differences in the safety consequences in comparison with non-biological drugs. The aim of the current study was to assess the post-marketing safety profile of biological drugs used in Iraqi hospitals by the analysis of the reported adverse drug reactions regarding their severity, seriousness, preventability, expectedness, and outcome. It is a retrospective study of the individu

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Properties of Khasib Formation in East Baghdad Oil Field Southern Area
...Show More Authors

Petrophysical properties evaluation from well log analysis has always been crucial for the identification and assessment of hydrocarbon bearing zones. East Baghdad field is located 10 km east of Baghdad city, where the southern area includes the two southern portions of the field, Khasib formation is the main reservoir of East Baghdad oil field.

In this paper, well log data of nine wells have been environmentally corrected, where the corrected data used to determine lithology, shale volume, porosity, and water saturation. Lithology identified by two methods; neutron-density and M-N matrix plots, while the shale volume estimated by single shale indicator and dual shale indicator, The porosity is calculated from the three common po

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Re-evaluation of Petro physical Properties in Yammama Formation at Nasiriya Field
...Show More Authors

Nasiriya field is located about 38 Km to the north – west of Nasiriya city. Yammama, a giant lower cretaceous reservoir in Nasiriya field which is lithologically formed from limestone. Yammama mainly was divided into three main reservoir units YA, YB1, YB2 and YB3 and it is separated by impermeable layers of variable thickness. An accurate petro physical evolution of the reservoir is of great importance perform an excellent geological model so that four petro physical properties which are shale volume, porosity, water saturation and permeability was re-evaluated. The volume of shale was calculated using the density and neutron logs (VSH-DN) rather than using gamma ray log because of presence a uranium content in the formation that make

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Advances In Mechanical Engineering
3D-shape formation of blood vessels based on computer aided design system
...Show More Authors

This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c

... Show More
View Publication
Scopus Clarivate Crossref