Preferred Language
Articles
/
eBb2j4oBVTCNdQwCD59g
An Efficient Mixture of Deep and Machine Learning Models for COVID-19 and Tuberculosis Detection Using X-Ray Images in Resource Limited Settings
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Dec 10 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Detection of Multiple Sclerosis Lesions in Supra- and Infra-Tentorial Anatomical Regions by Double Inversion Recovery, Flair, and T2 MRI Sequences: A Comparative Study in Iraqi Patients
...Show More Authors

Background: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The substitutions of Strontium by yttrium and their effects on Bi<sub>2</sub>Sr<sub>2</sub>-<sub>x</sub>Y<sub>x</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10</sub>+<sub>δ</sub> superconducting compound
...Show More Authors
Abstract<p>Superconducting compound Bi<sub>2</sub>Sr2-<sub>x</sub>Y<sub>x</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi<sub>2</sub>Sr<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th</p> ... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 19 2020
Journal Name
Revista De Chimie
Synthesis, Characterization and Biological Evaluation of Cr(III), Fe(III), Co(II), Ni(II), Zn(II) and Cd(II) Complexes Using an Azo Dye as Ligand
...Show More Authors

Azo ligand 11-(4-methoxyphenyl azo)-6-oxo-5,6-dihydro-benzo[4,5] imidazo[1,2-c] quinazoline-9-carboixylic acid was derived from 4-methoxyaniline and 6-oxo-5,6-dihydro-benzo[4,5]imidazo[1,2-c]quinazoline-9-carboxylic acid. The presence of azo dye was identified by elemental analysis and spectroscopic methods (FT-IR and UV-Vis). The compounds formed have been identified by using atomic absorption in flame, FT.IR, UV-Vis spectrometry magnetic susceptibility and conductivity. In order to evaluate the antibacterial efficiency of ligand and its complexes used in this study three species of bacteria were also examined. Ligand and its complexes showed good bacterial efficiencies. From the obtained data, an octahedral geometry was proposed for all p

... Show More
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Strategies of brain-based learning theory and its impact on the achievement of students of the Department of Art Education in Teaching Methods
...Show More Authors

The aim of the current research is to reveal the effect of using brain-based learning theory strategies on the achievement of Art Education students in the subject of Teaching Methods. The experimental design with two equal experimental and control groups was used. The experimental design with two independent and equal groups was used, and the total of the research sample was (60) male and female students, (30) male and female students represented the experimental group, and (30) male and female students represented the control group. The researcher prepared the research tool represented by the cognitive achievement test consisting of (20) questions, and it was characterized by honesty and reliability, and the experiment lasted (6) weeks

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2010
Journal Name
College Of Education Journal, Al-mustansiriyah University
Artin Characters for the Special Linear Group SL(2,p) where p is a prime number  19
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref