Preferred Language
Articles
/
dRarE4cBVTCNdQwCkDS7
Determining and Predicting the Water Demand Dynamic System Model Mapping Urban Crawling and Monitoring Using Remote Sensing Techniques and GIS
...Show More Authors

Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Science
Land cover change detection of Baghdad city using multi-spectral remote sensing imagery
...Show More Authors

Publication Date
Mon Feb 27 2023
Journal Name
Tem Journal
Predicting Age and Gender Using AlexNet
...Show More Authors

Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application

... Show More
View Publication
Scopus (9)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2017
Journal Name
Https://www.researchgate.net/journal/international-journal-of-science-and-research-ijsr-2319-7064
Evaluation of Water Quality using Bhargava Water Quality Index Method and GIS, Case Study: Euphrates River in Al-Najaf City
...Show More Authors

ENGLISH

Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
The 2d International Conference Of Buildings, Construction And Environmental Engineering (bcee2-2015)
Terrestrial Laser Scanning to Preserve Cultural Heritage in Iraq Using Monitoring Techniques
...Show More Authors

English

View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Applied Geophysics
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

View Publication
Scopus (13)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Applied Geophysics
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

Crossref (10)
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Private Backend Server Software-Based Telehealthcare Tracking and Monitoring System
...Show More Authors

In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso

... Show More
View Publication
Scopus (30)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed Jan 08 2020
Journal Name
Environment, Development And Sustainability
Groundwater availability and water demand sustainability over the upper mega aquifers of Arabian Peninsula and west region of Iraq
...Show More Authors

View Publication
Crossref (89)
Crossref