Preferred Language
Articles
/
jih-320
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
Automated Methods to Segment Kidneys and Detect Tumors Using CT Images
...Show More Authors

Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors. In this paper, tried to implement an automated segmentation methods of gray level CT images is used to provide information such as anatomical structure and identifying the Region of Interest (ROI) i.e. locate tumor, lesion and other in kidney.
A CT image has inhomogeneity, noise which affects the continuity and accuracy of the images segmentation. In

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Minimum spanning tree application in Covid-19 network structure analysis in the countries of the Middle East
...Show More Authors

Coronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Fuzzy Entropy in Adaptive Fuzzy Weighted Linear Regression Analysis with Application to Estimate Infant Mortality Rate
...Show More Authors

An adaptive fuzzy weighted linear regression model in which the output is based
on the position and entropy of quadruple fuzzy numbers had dealt with. The solution
of the adaptive models is established in terms of the iterative fuzzy least squares by
introducing a new suitable metric which takes into account the types of the influence
of different imprecisions. Furthermore, the applicability of the model is made by
attempting to estimate the fuzzy infant mortality rate in Iraq using a selective set of
inputs.

View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Finite Element Neural Network And Its Applications To Forward And Inverse Problems
...Show More Authors

In this paper, first we   refom1Ulated   the finite   element  model

(FEM)   into   a   neural   network   structure   using   a   simple   two   - dimensional problem. The structure of this neural network is described

, followed  by its   application   to   solving  the forward    and  inverse problems. This model is then extended to the general case and the advantages and  di sadvantages  of  this  approach  are  descri bed  along with an analysis  of  the sensi tivity   of

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Estimation of Heavy Metals Contamination in the Soil of Zaafaraniya City Using the Neural Network
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Hybrid Approach of Prediction Daily Maximum and Minimum Air Temperature for Baghdad City by Used Artificial Neural Network and Simulated Annealing
...Show More Authors

     Temperature predicting is the utilization to forecast the condition of the temperature for an upcoming date for a given area. Temperature predictions are done by gathering quantitative data in regard to the current state of the atmosphere. In this study, a proposed hybrid method to predication the daily maximum and minimum air temperature of Baghdad city which combines standard backpropagation with simulated annealing (SA). Simulated Annealing Algorithm are used for weights optimization for recurrent multi-layer neural network system. Experimental tests had been implemented using the data of maximum and minimum air temperature for month of July of Baghdad city that got from local records of Iraqi Meteorological O

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 24 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Using Bioluminescence Assay to Detect Snps Cause Drug Resistant of Mycobacterium Tuberculosis in Iraq
...Show More Authors

In this search, a new bioluminescent technique was proved for pyrophosphate which was employed to single- nucleotide polymorphism (SNP) diagnosis using one-base extension reaction. Four Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG, GyrA) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad., also one specimen was used as a negative control. The procedure of this assay was as follows. A specific primer within each aliquot owning a short 3-OH end of the base of the target gene was hybridized to the single-stranded DNA template. Then, (exo-) Klenow DNA polymerase and one of either ?-thio-dATP, dTTP, dGTP, or dCTP

... Show More
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Identifying the factors affecting in the Intentions to continue using of the government social media
...Show More Authors

Abstract

Social media has thrived recently and public organizations at Thi-Qar governorate across different levels are experimenting with launching government social media (GSM) to facilitating two-way interactions between the government and its citizens. Both scholars and practitioners are focusing on understanding the key success factors related to the create of GSM. This study aimed to identify the key success factors by exploring the formation mechanism of individuals’ continuous usage intention. Through the theoretical perspective of the uses and gratifications theory. We identify the gratification factors that stimulate users’ continuance intention toward GSM. Furthermore, we draw upon the stimulus–organism–

... Show More
View Publication Preview PDF
Crossref