Preferred Language
Articles
/
dRYGVocBVTCNdQwCq0aO
SPE-188966-MS: Drilling problems detection in Basrah oil fields using smartphones
...Show More Authors

Scopus
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Detection and Diagnosis of Induction Motor Faults by Intelligent Techniques
...Show More Authors

This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and  two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 02 2014
Journal Name
Journal Of Theoretical And Applied Information Technology
TUMOR BRAIN DETECTION THROUGH MR IMAGES: A REVIEW OF LITERATURE
...Show More Authors

Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin

... Show More
Scopus (46)
Scopus
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Practical Study for the Properties of Hueckel Edge Detection Operator
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Detection of Bacteriocin Production and Induction by Brassica rapa extract
...Show More Authors

  The present study aimed to try to find natural substances stimulate the production of bacteriocin, as well as "for detection of bacteriocin producing isolates. Two hundred and eighty ( 280)  bacterial isolates, gram negative only, were collected from 760 different pathogenic samples, consist: (Urinary tract infection, septicemia, Vaginal inflammation and diarrhea).  The isolated bacteria are: Escherichia coli, Klebsiella  pneumonia Pseudomonas  aeruginosa,, Salmonella typhi, Enterobacter cloacae, Acinetobacter baumannii, Serratia  liquefaciens, Citrobacter  freundii,  Proteus  mirabilis and Serrattia  odorifera.  Cup assay method was  used to detect bacteriocin production. Loc

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (32)
Crossref (20)
Scopus Crossref