Preferred Language
Articles
/
ijs-346
Evaluation of Case detection rates of Pulmonary Tuberculosis before and after adoption of GeneXpert MTB/RIF
...Show More Authors

     Cities witnessing mass-gathering events, such as Kerbala-Iraq, are peculiar in respect to their needs in controlling tuberculosis. DOTS was implemented in Kerbala almost two decades ago. GeneXpert MTB/RIF assay is adopted in the hope to escalate case detection rates, however, its performance is not evaluated yet. Records of 3254 patients suspected to have pulmonary TB whom they referred to the chest and Respiratory illnesses center of Kerbala governorate were analyzed. The overall trends of TB detection rates showed declining pattern over the year before the adoption of GeneXpert MTB/RIF. In the year of adoption of Xpert MTB/RIF, the detection rates raised, then after declined again. The GeneXpert MTB/RIF has added 17.7% increase in detectionrates.

In conclusion: GeneXpertMTP/RIF usage had strengthen case detection rates especially for smear-negative cases.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 08 2021
Journal Name
Public Works Management & Policy
Causes of Problems in Post-Disaster Emergency Re-Construction Projects—Iraq as a Case Study
...Show More Authors

This study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is

... Show More
View Publication
Scopus (16)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Total Dissolved Salt Prediction Using Neurocomputing Models: Case Study of Gypsum Soil Within Iraq Region
...Show More Authors

View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
Uncertainty Analysis to Assess Depth Conversion Accuracy: A Case Study of Subba Oilfield, Southern Iraq
...Show More Authors

    The depth conversion process is a significant task in seismic interpretation to establish the link between the seismic data in the time domain and the drilled wells in the depth domain. To promote the exploration and development of the Subba oilfield, more accurate depth conversion is required. In this paper, three approaches of depth conversions: Models 1, 2, and 3 are applied from the simplest to the most complex on Nahr Umr Reservoir in Suba oilfield. This is to obtain the best approach, giving less mistakes with the actual depth at well locations and good inter/extrapolation between or away from well controls. The results of these approaches, together with the uncertainty analysis provide a reliable velocity model

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Genetic Algorithm-Based Anisotropic Diffusion Filter and Clustering Algorithms for Thyroid Tumor Detection
...Show More Authors

Medical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The new industrial cities and resources sustainability - case study: industrial zone in Ramady city
...Show More Authors
Abstract<p>The modern industrial projects and complexes that adopt ecological systems, and renewable, clean and environmentally friendly energy, not only contribute to the development of an environmentally friendly production method but can achieve long-term economic and industrial development by preserving environmental resources. The ecological industrial systems and modern industrial technologies are the ideal solutions to rationalize excessive use and preserve the elements of the environment and natural resources, the most important of which is the existence of several methods and programs for the development of industrial sites, and there is important to adopt mechanisms and programs to sol</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 06 2024
Journal Name
Al- Anbar Medical Journal
Metastatic Ovarian Tumor from Incidental Renal Cell Carcinoma: A Case Report and Literature Review
...Show More Authors

View Publication Preview PDF
Scopus Crossref