Preferred Language
Articles
/
ijp-128
Detection and interpretation of clouds types using visible and infrared satellite images
...Show More Authors

One of the most Interesting natural phenomena is clouds that have a very strong effect on the climate, weather and the earth's energy balance. Also clouds consider the key regulator for the average temperature of the plant. In this research monitoring and studying the cloud cover to know the clouds types and whether they are rainy or not rainy using visible and infrared satellite images. In order to interpret and know the types of the clouds visually without using any techniques, by comparing between the brightness and the shape of clouds in the same area for both the visible and infrared satellite images, where the differences in the contrasts of visible image are the albedo differences, while in the infrared images is the temperature differences. The data are taken by (MODIS), (GOES) and (METEOSAT) because these satellites are forecasting in a near lifetime data. The case studied in 24/12/2016 over the area of Iraq.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Textural Analysis of Liver Tumor using Watershed Segmentation based on Statistical and Geometrical features
...Show More Authors

The liver diseases can define as the tumor or disorder that can affect the liver and causes deformation in its shape. The early detection and diagnose of the tumor using CT medical images, helps the detector to specify the tumor perfectly. This search aims to detect and classify the liver tumor depending on the use of a computer (image processing and textural analysis) helps in getting an accurate diagnosis. The methods which are used in this search depend on creating a binary mask used to separate the liver from the origins of the other in the CT images. The threshold has been used as an early segmentation. A Process, the watershed process is used as a classification technique to isolate the tumor which is cancer and cyst.

&nbsp

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Efficient Method to Segment Objects from Images Based on Enhanced Connected Component Labeling algorithm
...Show More Authors

This paper include the problem of segmenting an image into regions represent (objects), segment this object by define boundary between two regions using a connected component labeling. Then develop an efficient segmentation algorithm based on this method, to apply the algorithm to image segmentation using different kinds of images, this algorithm consist four steps at the first step convert the image gray level the are applied on the image, these images then in the second step convert to binary image, edge detection using Canny edge detection in third Are applie the final step is images. Best segmentation rates are (90%) obtained when using the developed algorithm compared with (77%) which are obtained using (ccl) before enhancement.

View Publication Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Fixed Point Theorem for Some Types of Fuzzy Jungck Contractive Mappings In Hilbert Space
...Show More Authors

         In this paper, developed Jungck contractive mappings into fuzzy Jungck contractive and proved  fuzzy fixed point for some types of generalize fuzzy Jungck contractive mappings.

 

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effects of three different types of intracoronal bleaching agents on shear bond strength of stainless steel and sapphire brackets bonded to endodontically treated teeth (An in vitro study)
...Show More Authors

Background: evaluate the effects of three different intracoronal bleaching agents on the shear bond strengths (SBS) and failure site of stainless steel and monocrystalline (sapphire) orthodontic brackets bonded to endodontically treated teeth using light cured orthodontic adhesive in vitro. Materials and methods: Eighty extracted sound human upper first premolars were selected, endondontically treated and randomly divided equally (according to the type of the brackets used) into two main groups (n = 40 per group). Each main group were subdivided (according to the bleaching agent used) into four subgroups 10 teeth each; as following : control (un bleached) group, hydrogen peroxide group (Hp) 35%, carbamide peroxide group (CP) 37% group and s

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review
...Show More Authors

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of leukocytes cells types counts in blood from patients with different severities of periodontal diseases
...Show More Authors

Background: Periodontal diseases are inflammatory disorders caused by the accumulation of oral biofilm and the host response to this accumulation which characterized by exaggerated leukocytes and neutrophils attraction to the sites of inflammation by chemoattractants which are a very important part of the pathogenesis of periodontal diseases. This study aimed to determine and compare the clinical periodontal parameters and the leukocyte cell types in the peripheral blood between patients with gingivitis and periodontitis with different severities compared to healthy controls. Materials and methods: This study included 150 male subjects aged between 35-50 years. They were divided into three groups: gingivitis group (n=30), periodontitis p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Agitation Negative Social Behaviours in the Talk Shows of the (NRT) Satellite Channel: Research extracted from a master's thesis
...Show More Authors

This research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that

... Show More
View Publication Preview PDF
Crossref