Preferred Language
Articles
/
bsj-902
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the middle point of intended line. Any modification, addition or deletion in a letter, word, or line in the document will be detected.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
GIS as A Tool for Expansive Soil Detection at Sulaymaniyah City
...Show More Authors

Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Monitoring of south Iraq marshes using classification and change detection techniques
...Show More Authors

Digital change detection is the process that helps in determining the changes associated with land use and land cover properties with reference to geo-registered multi temporal remote sensing data. In this research change detection techniques have been employed to detect the changes in marshes in south of Iraq for two period the first one from 1973 to 1984 and the other from 1973 to 2014 three satellite images had been captured by land sat in different period. Preprocessing such as geo-registered, rectification and mosaic process have been done to prepare the satellite images for monitoring process. supervised classification techniques such maximum likelihood classification has been used to classify the studied area, change detection aft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Detection of Suicidal Ideation on Twitter using Machine Learning & Ensemble Approaches
...Show More Authors

Suicidal ideation is one of the most severe mental health issues faced by people all over the world. There are various risk factors involved that can lead to suicide. The most common & critical risk factors among them are depression, anxiety, social isolation and hopelessness. Early detection of these risk factors can help in preventing or reducing the number of suicides. Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. This paper presents a methodology and experimentation using social media as a tool to analyse the suicidal ideation in a better way, thus helping in preventing the chances of being the victim o

... Show More
View Publication Preview PDF
Scopus (44)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Electronically Implementation and Detection of Pulse Laser from Continuous Laser Diode
...Show More Authors

This research aims to design a high-speed laser diode driver and photodetector, the result is the
design of the high-speed laser diode driver with a short pulse of 10 ns at 30 KHz frequency and the
delivered maximum pulse voltage is 5.5 mV. Also, its optical output power of the laser diode driver is
about 2.529 mW for the centroied wavelength 1546.7 nm with FWHM of 286 pm and (1270-1610) nm.
The design of the circuit based on bipolar transistor where the input pulse signal is simply generated by
an arduino kit with 15 kHz frequency and then compensated to trigger to small signal amplifier which
was is simply NPN C3355 transistor and the output is a current driver to the laser diode. OptiSystem
software and Electronic

... Show More
View Publication Preview PDF
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An Effective Hybrid Deep Neural Network for Arabic Fake News Detection
...Show More Authors

Recently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (20)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Mustansiriya Medical Journal
Molecular Detection of Agglutinin-Like Sequence 1 Gene in Candida albicans that is Isolated from Diabetic Foot Patients
...Show More Authors
Objectives:

Candida albicans is a microbe living within the natural human flora and is found in the upper respiratory tract, mouth, intestines, and vagina. C. albicans is able to cause infections that range from superficial infections of the skin to life-threatening systemic infections.

Aim of Study:

Detection of virulence gene agglutinin-like sequence (ALS) 1 by using molecular technology from clinical samples (C. albicans

... Show More
View Publication
Crossref (1)
Crossref