Preferred Language
Articles
/
bsj-9775
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can precisely recognize the human central issues, really work on the exactness of human posture assessment, and can adjust to the intricate scenes with thick individuals and impediment. Finally, the difficulties and possible future trends are described, and the development of the field is presented.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Functionalized multi-walled carbon nanotubes network sensor for NO2 gas detection at room temperature
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of penetration Rate and cost with Artificial Neural Network for Alhafaya Oil Field
...Show More Authors

Prediction of penetration rate (ROP) is important process in optimization of drilling due to its crucial role in lowering drilling operation costs. This process has complex nature due to too many interrelated factors that affected the rate of penetration, which make difficult predicting process. This paper shows a new technique of rate of penetration prediction by using artificial neural network technique. A three layers model composed of two hidden layers and output layer has built by using drilling parameters data extracted from mud logging and wire line log for Alhalfaya oil field. These drilling parameters includes mechanical (WOB, RPM), hydraulic (HIS), and travel transit time (DT). Five data set represented five formations gathered

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Automatic Spike Neural Technique for Slicing Bandwidth Estimated Virtual Buffer-Size in Network Environment
...Show More Authors

The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Iraqi Geological Journal
Geomechanical Modeling and Artificial Neural Network Technique for Predicting Breakout Failure in Nasiriyah Oilfield
...Show More Authors

Wellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Improving propagation of Echinacea purpurea and its content of some active compounds by using Tyrosine and Salicylic acid in vitro
...Show More Authors

The seed propagation is the predominant method of Echinacea propagation, which has been criticized for its time-consuming control over the separation factor and the uncertainty of pathogen-free plants produced by this method. The technology of tissue culture has provided multiple opportunities for the production of secondary metabolites continuously without being restricted to a specific season, due to the possibility of controlling the environmental conditions and the components of the nutrient medium needed by the plant. This study was conducted to investigate the effects of salicylic acid as elicitor and tyrosine as precursor on propagation and some secondary compounds production in coneflower in vitro. The result showed the superiori

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Impact of Exposure Period to Liquid Nitrogen Vapor on Criteria of Human Spermatozoa Cryopreserved in New Cryopreservation Technique
...Show More Authors

Abstract Background: The emptied sheep’s ovarian follicles recently used as a container for spermatozoa during cryopreservation, it was found a proper carrier to cryopreserving spermatozoa in vapor-dependent cryopreservation. The aim of this study was to evaluate the effect of two periods of exposure to liquid nitrogen (LN2)vapor on the parameter of spermatozoa during cryopreservation in this technique. Method: The study was conducted on 30 semen samples from patients with oligozoospermia diagnosed by semen analysis according to the standard criteria of World Health Orgnization (WHO) 2010. Sheep’s ovarian follicles obtained from local slaughterhouse and prepared by slicing the ovaries and evacuating the follicular fluid and oocyt

... Show More
View Publication
Crossref
Publication Date
Wed Jun 02 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Estimation of the Cytotoxic Effects of Yucca Gloriosa Variegata Leaves Extract on Albino Mice
...Show More Authors

Yucca gloriosa Variegata L. is a stemless. The whole plant of Y. gloriosa L. has vast medicinal uses. TheNative Americans and North New Mexico used a tea from the leaves and roots to treat asthma, headache,wound healing. As well as it was being consumed as daily dietary. All part of Y. gloriosa L. is rich in saponinsteroidal glycosides. Saponin extracts are well-known to be highly toxic. Hence, present study was carriedout to investigate the toxicity of saponin and estimate the LD50 value which helps in determining the safedose range for the drug that be used, as well as to determine hematological aspects and examine histologicaleffect. Different concentrations of saponin extract were injected into male mice (10,000, 8000, 6000, 400

... Show More
View Publication
Crossref