Preferred Language
Articles
/
ijs-6072
Methods and Simulations used to Detect Photons from Exoplanets of a Parent Star

The extrasolar planets in the vicinity of stars are expected to be bright enough
and are very difficult to be observed by direct detection. The problem is attributed to
the side loops of the star that created due to the telescope diffraction processing.
Several methods have been suggested in the literatures are being capable to detect
exoplanet at a separation angle of 4λ/D and at a contrast ratio of 10-10. These
methods are more than one parameter function and imposing limitations on the inner
working distance. New simple method based on a circular aperture combined with a
third power Gaussian function is suggested. The parameters of this function are then
optimized based on obtaining a minimum inner working distance This method is
capable of detecting exoplanet with an angular separation of 4λ/D and a contrast
ratio of 10-10 and it is much easier to be implemented practically.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
Scopus (49)
Crossref (47)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Effect of Successive Convolution Layers to Detect Gender

Image classification can be defined as one of the most important tasks in the area of machine learning. Recently, deep neural networks, especially deep convolution networks, have participated greatly in end-to-end learning which reduce need for human designed features in the image recognition like Convolution Neural Network. It is offers the computation models which are made up of several processing layers for learning data representations with several abstraction levels. In this work, a pre-trained deep CNN is utilized according to some parameters like filter size, no of convolution, pooling, fully connected and type of activation function which includes 300 images for training and predict 100 image gender using probability measures. Re

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Malaysian Journal Of Biochemistry And Molecular Biology
Scopus
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Comparison of the Combining Methods Used In Space Diversity

The basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).

Crossref
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Deep Convolutional Neural Network Architecture to Detect COVID-19 from Chest X-Ray Images

      Today, the world is living in a time of epidemic diseases that spread unnaturally and infect and kill millions of people worldwide. The COVID-19 virus, which is one of the most well-known epidemic diseases currently spreading, has killed more than six million people as of May 2022. The World Health Organization (WHO) declared the 2019 coronavirus disease (COVID-19) after an outbreak of SARS-CoV-2 infection. COVID-19 is a severe and potentially fatal respiratory disease caused by the SARS-CoV-2 virus, which was first noticed at the end of 2019 in Wuhan city. Artificial intelligence plays a meaningful role in analyzing medical images and giving accurate results that serve healthcare workers, especially X-ray images, which are co

... Show More
Scopus (5)
Crossref (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Molecular Study to Detect Genotyping of Giardia lamblia from Human and Cattle Feces in Al-Qadisiya Governorate, Iraq

The present study is designed to diagnose the giardiasis from cattle and patients with diarrhea arrivals to Maternity and Childhood Teaching Hospital and General Education Hospital in Al-Qadisiya Governorate by using direct wet smear method as well as knowledge of the rate of prevalence of giardiasis in Al- Diwaniyah province, and study the effect of age, sex and nature of residence in the proportions of infection and investigate the genotypes of Giardia lamblia from human and animal feces ,100 samples were collected (50 stool samples of human and 50 feces samples of cattle). In human, the result showed that the infection rate was 54% (27). The age group of 2-4 years showed the highest rate of infection (40.7%), while children aged 8-10

... Show More
Crossref (7)
Crossref
View Publication Preview PDF
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Kolmogorov Turbulent Simulations of Photon Limited Images of Binary Stars

The autocorrelation function calculations have been carried out on photon-limited computer-simulated images of binary stars that recorded through kolmogorov atmospheric turbulence. The effect of the parameters of photon limited binary star on the variation of signal to noise, signal to background ratios, number of images that processed and the magnitude of binary stars are studied and mathematic equations are given to investigate this effect. The result indicates that signal to background ratio of photon limited images of a binary star is independent of the total number of recorded photons.

 

View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Analysis of Methods and Techniques Used for Speaker Identification, Recognition, and Verification: A Study on Quarter-Century Research Outcomes

The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

Crossref
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More