Preferred Language
Articles
/
ijp-342
Automated method for buried object detecting using ground penetrating radar (GPR) survey
...Show More Authors

  Ground Penetrating Radar (GPR) is a nondestructive geophysical technique that uses electromagnetic waves to evaluate subsurface information. A GPR unit emits a short pulse of electromagnetic energy and is able to determine the presence or absence of a target by examining the reflected energy from that pulse. GPR is geophysical approach that use band of the radio spectrum. In this research the function of GPR has been summarized as survey different buried objects such as (Iron, Plastic(PVC), Aluminum) in specified depth about (0.5m) using antenna of 250 MHZ, the response of the each object can be recognized as its shapes, this recognition have been performed using image processing such as filtering. Where different filters like (DC adjustment, triangular FIR, delete mean trace, FIR) have been applied on output image as well as the simulation of the soil and the buried objects layers have been obtained using GPR simulation program.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 21 2020
Journal Name
Journal Of Engineering
Development of Iraqi license plate recognition system based on Canny edge detection method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo

... Show More
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
The Linear Delay Fourth Order Eigen-Value Problems Solved By the Collocation Method
...Show More Authors

Publication Date
Wed May 01 2019
Journal Name
Optik
Ag2S/ZnO Nanorods Composite Photoelectrode Prepared by Hydrothermal Method: Influence of Growth Temperature
...Show More Authors

View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Application of Multi-Objective Optimization on the basis of Ratio Analysis (MOORA) Method
...Show More Authors

The paper aims is to solve the problem of choosing the appropriate project from several service projects for the Iraqi Martyrs Foundation or arrange them according to the preference within the targeted criteria. this is done by using Multi-Criteria Decision Method (MCDM), which is the method of Multi-Objective Optimization by Ratios Analysis (MOORA) to measure the composite score of performance that each alternative gets and the maximum benefit accruing to the beneficiary and according to the criteria and weights that are calculated by the Analytic Hierarchy Process (AHP). The most important findings of the research and relying on expert opinion are to choose the second project as the best alternative and make an arrangement acco

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Antibacterial Activity Of ternary semiconductor compounds AgInSe2 Nanoparticles Synthesized by Simple Chemical Method
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 06 2018
Journal Name
Digest Journal Of Nanomaterials And Biostructures
HIGHER PHOTO SENSITIVITY OF Co-Y-OXIDE NANO STRUCTURE SYNTHESIZED BY HYDROTHERMAL METHOD
...Show More Authors

In this work, Co-Y-oxide Nano Structure is successfully synthesized via hydrothermal method. The XRD analysis, SEM analysis, optical, electrical and photo sensing properties have been investigated for Co3O4 and Co-Y-oxide thin films. The X-ray diffraction (XRD) analysis reveals that all films are polycrystalline in nature, having cubic structure. The SEM images of thin films clearly indicates that Co3O4 possesses nanosphere like structure and flower like for Co-Y-oxide. The optical properties show that the optical energy gap follows allowed direct electronic transition calculated using Tauc equation and it increases for Co-Y-oxide. The photo sensing properties of thin films are investigated as a function of time at different wavelengths to

... Show More
Scopus (4)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref