Preferred Language
Articles
/
YRfzV5IBVTCNdQwCrKzf
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical evaluation for integrin binding sialoprotein on healing process of intrabony defect treated by bone sialoprotein
...Show More Authors

Background: Bone defect healing is a multidimensional procedure with an overlapping timeline that involves the regeneration of bone tissue. Due to bone's ability to regenerate, the vast majority of bone abnormalities can be restored intuitively under the right physiological conditions. The goal of this study is to examine the immunohistochemistry of bone sialoprotein in order to determine the effect of local application of bone sialoprotein on the healing of a rat tibia generated bone defect. Materials and Methods: In this experiment, 48 albino male rats weighing 300-400 grams and aged 6-8 months will be employed under controlled temperature, drinking, and food consumption settings. The animals will be subjected to a surgical procedure o

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Journal Of Baghdad University College Of Dentistry
Immunohistochemical evaluation for integrin binding sialoprotein on healing process of intrabony defect treated by bone sialoprotein
...Show More Authors

Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri May 03 2024
Journal Name
Optical And Quantum Electronics
Design and analysis of a dual-core PCF biosensor based on SPR for cancerous cells detection
...Show More Authors

View Publication
Scopus (23)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Electromagnetic Scattering Properties and Characterisation of Sintered SiC Composite–Based Microwave Spectrum
...Show More Authors

واحدة من أكثر مواد السيراميك الهيكلية الواعدة هي كربيد السيليكون(SiC) ، حيث له خصائص حرارية وكهروميكانيكية ممتازة. هذه الخصائص مفيدة ل CMC لتعزيز أداء المركب خاصة عند إضافات النانو المتكاملة. في هذا البحث, تم تصنيع مركب SiC من SiC بثلاثة تركيزات مع  ZnO و Si. تم اختبار الخواص المغناطيسية لجميع المخاليط باستخدام مراقبة العينة الاهتزازية (VSM). تم تلبيد العينات الخضراء في فرن التلبيد عند 1600 درجة مئوية في بيئة النيتروجي

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
2012 International Symposium On Innovations In Intelligent Systems And Applications
Edge detection for fast block-matching motion estimation to enhance Mean Predictive Block Matching algorithm
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref