Preferred Language
Articles
/
ijs-8226
Finding the Best Analysis for the Sleeper Cells of Terrorist Acts in the Crowded Areas of Human Activities in the City of Baghdad
...Show More Authors

     Terrorist operations disturbed societies and threatened their existence due to destructive ideas carried by those groups that believe in radical change and the use of multiple methods to implement their ideas, as well as taking methods of concealment among society, so it has become difficult to detect them. The study's purpose is to locate sleeper cells of terrorist operations in areas dense with various human activities using remote sensing techniques and geographic information systems programs. The programs were used to analyze the group of terrorist incidents data that occurred in Baghdad in 2011 and study how to limit the crimes spreading in Baghdad. The study included building a model in spatial information systems for sites by identifying the accidents by simulating the reality with the Global Positioning System (GPS) to be a starting point for the spatial analysis of the accidents and devising a scientific approach to locate sleeper cells using statistical methods and theories. Moreover, predictive research focuses on several spatial studies to produce predictive maps for the sleeper cell sites spreading from their location toward the cities. The GIS proved to be one of the primary software packages that help decision-makers take appropriate measures at the right time, predict the spatial spread of future accidents, and control them in the future to be an effective model for researchers.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (6)
Scopus
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Cr2O3:TiO2 Nanostructure Thin Film Prepared by Pulsed Laser Deposition Technique as NO2 Gas Sensor
...Show More Authors

Pulsed laser deposition (PLD) technique was applied to prepared Chromium oxide (Cr2O3) nanostructure doped with Titanium oxide (TiO2) thin films at different concentration ratios 3,5,7 and 9 wt % of TiO2. The effect of TiO2 dopant on the average size of crystallite of the synthesized nanostructures was examined by X-ray diffraction. The morphological properties were discussed using atomic force microscopy(AFM). Observed optical band gap value ranged from 2.68 eV to 2.55 eV by ultraviolet visible(UV-Vis.) absorption spectroscopy with longer wave length shifted  in comparison with that of the bulk Cr2O3 ~3eV. This indicated that the synthesized samples a

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Molar tubes and failure rates–A review
...Show More Authors

Objectives: To review the failure rates of molar tubes and the effect of molar tube base design, adhesive type, and bonding technique on the failure rates of molar tubes. Data: The revolution of molar bonding greatly impacted fixed orthodontic appliance treatment by reducing chair-side time and improving patient comfort. Even with the many advantages of molar bonding, clinicians sometimes hesitate to use molar tubes due to their failure rates. Sources: Internet sources, such as Pubmed and Google Scholar. Study selection: studies testing the bond failure rate of molar tubes. Conclusions: The failure rate of the molar tubes can be reduced and the bond strength of the molar tubes can be improved by changing the design of the molar tube base

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Producing Hydrogen Energy Using Cr2O3-TiO2 Nanocomposite with Animal (Chitosan) Extract via Photocatalaysis
...Show More Authors

      In this study, an efficient photocatalyst for water splitting was developed. The Cr2O3 and TiO2 nanoparticles (Cr2O3-TNPs) nanocomposite with (Chitosan extract) was created using ecologically friendly methods, such as the impregnation technique as TiO2 exhibits nano spherical (TNPs) shape structure. According to the researchers, this nanocomposite material enhanced its ability to absorb ultraviolet light while also speeding up the recombination of photogenerated electrons and holes. The TNPs and prepared Cr2O3-TNPs were characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM), energy dispersive x-ray sp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Plagiarism Detection Methods and Tools: An Overview
...Show More Authors

Plagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (16)
Scopus Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Fuzzy Based Spam Filtering
...Show More Authors

Emails have proliferated in our ever-increasing communication, collaboration and
information sharing. Unfortunately, one of the main abuses lacking complete benefits of
this service is email spam (or shortly spam). Spam can easily bewilder system because
of its availability and duplication, deceiving solicitations to obtain private information.
The research community has shown an increasing interest to set up, adapt, maintain and
tune several spam filtering techniques for dealing with emails and identifying spam and
exclude it automatically without the interference of the email user. The contribution of
this paper is twofold. Firstly, to present how spam filtering methodology can be
constructed based on the concep

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 17 2022
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review on Viral Encephalitis-
...Show More Authors

Background: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis.

Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications.

Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis.

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Microcontroller – Based Spectrum Analyzer
...Show More Authors

This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.

... Show More
View Publication
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus Crossref