Preferred Language
Articles
/
alkej-566
Analysis of Wave Propagation in Detection of Aorta Dieses Using Lumps Analysis
...Show More Authors

In this paper a theoretical attempt is made to determine whether changes in the aorta diameter at different location along the aorta can be detected by brachial artery measurement.  The aorta is divided into six main parts, each part with 4 lumps of 0.018m length. It is assumed that a desired section of the aorta has a radius change of 100,200, 500%. The results show that there is a significant change for part 2 (lumps 5-8) from the other parts. This indicates that the nearest position to the artery gives the significant change in the artery wave pressure while other parts of the aorta have a small effect.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
ARZI KANBER HİKAYESİ'NİN IRAK TÜRKMENLERİ ARASINDA TESPİT EDİLEN YENİ BİR VARYANTI'NIN İNCELENMESİ ANALYZING A NEW TEXT OF " ARZO AND QENBER "TALE AMONG IRAQI TURKMENS
...Show More Authors

Öz      

            Arzı Kanber/Kamber hikayesi Anadolu, Rumeli, Azerbaycan, Türkmenistan ve Irak gibi Türk dünyasının birçok yerinde birden fazla varyantı bulunan, çok sevilen ve yaygın olarak anlatılan aşk ve dramatik maceralı bir halk hikayesidir. Türk halk hikayelerinin en popüler olanlarından biri sayılan Arzı Kanber/Kamber hikayesi, Anadolu'nun birçok yöresinde bilinmesine rağmen Irak Türkmenleri arasında daha çok sevildiği ve yaygın olarak anlatıldığı tespit edilen birden fazla varyantından da görülebilir. Irak Türkmenleri arasında günümüze kadar hikayenin iki varyantı tespit edilmi

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Classification of Brown risks in Evaluation of the internal control system: Application Research in Karbala University
...Show More Authors

Internal control system is a safety valve that preserves economic units assets and ensure the accuracy of financial data, as well as to obligation in the laws, regulations, administrative policies ,and improve the efficiency, effectiveness and economic of operation, so it has become imperative for these units attention to internal and developed control system The research problem in exposure the economic units when the exercise of their business to many of the risks to growth or hinder the achievement of its objectives and the risks (financial, operational, strategy, risk) and not it rely on risk Assessment according to modern scientific methods, as in Brown's risk Classification, Which led to the weakness of the internal control identif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Inorganic Chemistry Communications
Detection of nitrotyrosine (Alzheimer's agent) by B24N24 nano cluster: A comparative DFT and QTAIM insight
...Show More Authors

A nano-sensor for nitrotyrosine (NT) molecule was found by studying the interactions of NT molecule with new B24N24 nanocages. It was calculated using density functionals in this case. The predicted adsorption mechanisms included physical and chemical adsorption with the adsorption energy of −2.76 to −4.60 and −11.28 to −15.65 kcal mol−1, respectively. The findings show that an NT molecule greatly increases the electrical conductivity of a nanocage by creating electronic noise. Moreover, NT adsorption in the most stable complexes significantly affects the Fermi level and the work function. This means the B24N24 nanocage can detect NT as a Φ–type sensor. The recovery time was determined to be 0.3 s. The sensitivity of pure BN na

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref