Preferred Language
Articles
/
ijs-5866
Detection of Snow Cover us ing NDSI and False Color Methods
...Show More Authors

Snowfall is one of the most important natural phenomena that can be seen in the
winter which is considered as a rare phenomenon in the Middle East. Snow is
covering parts of mountains in northern Iraq and neighboring countries in the first
months of the year. In this research, the snow cover can be detected and monitored
using pseudo color method, and the Normalized Difference Snow INDECES
(NDSI). Snow cover is difficult to detect in true color satellite images because the
white color of snow cover is the same color with the cloud cover. Modis sensors that
carried by Terra and Equa satellites images have been used in different bands and
different resolution and the case studied in 4/2/2017, 5/2/2017.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Using Some Robust Methods For Handling the Problem of Multicollinearity
...Show More Authors

The multiple linear regression model is an important regression model that has attracted many researchers in different fields including applied mathematics, business, medicine, and social sciences , Linear regression models involving a large number of independent variables are poorly performing due to large variation and lead to inaccurate conclusions , One of the most important problems in the regression analysis is the multicollinearity Problem, which is considered one of the most important problems that has become known to many researchers  , As well as their effects on the multiple linear regression model, In addition to multicollinearity, the problem of outliers in data is one of the difficulties in constructing the reg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Processing of Polymers Stress Relaxation Curves Using Machine Learning Methods
...Show More Authors

Currently, one of the topical areas of application of machine learning methods is the prediction of material characteristics. The aim of this work is to develop machine learning models for determining the rheological properties of polymers from experimental stress relaxation curves. The paper presents an overview of the main directions of metaheuristic approaches (local search, evolutionary algorithms) to solving combinatorial optimization problems. Metaheuristic algorithms for solving some important combinatorial optimization problems are described, with special emphasis on the construction of decision trees. A comparative analysis of algorithms for solving the regression problem in CatBoost Regressor has been carried out. The object of

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
International Journal Of Applied Pharmaceutics
THE IMPACT OF NEW TARGETING METHODS IN THE CANCER THERAPY
...Show More Authors

Rapid development has achieved in treating tumor to stop malignant cell growth and metastasis in the past decade. Numerous researches have emerged to increase potency and efficacy with novel methods for drug delivery. The main objective of this literature review was to illustrate the impact of current new targeting methods to other previous delivering systems to select the most appropriate method in cancer therapy. This review first gave a brief summary of cancer structure and highlighted the main roles of targeting systems. Different types of delivering systems have been addressed in this literature review with focusing on the latest carrier derived from malarial protein. The remarkable advantages and main limitations of the later

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review
...Show More Authors

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Edge Detection Using Circular Sliding Window
...Show More Authors

    In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.

View Publication Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
World Journal Of Pharmaceutical Sciences
Detection of JAK2V617F Mutation and Serum Levels of Alkaline Phosphatase and Lactate Dehydrogenase in Chronic Myelogenous Leukemia.
...Show More Authors

Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a

... Show More
Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Rawaa Emad Jaloud And Fadia Falahfadia Falah
Isolation and Identification of Fungal Propagation in Iraqi Meat and Detection of Aflatoxin B1 Using ELISA Technique
...Show More Authors

Scopus (5)
Scopus