Preferred Language
Articles
/
lRibdJQBVTCNdQwCsBhF
Land cover change detection of Baghdad city using multi-spectral remote sensing imagery
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Resilience among Students in Baghdad University
...Show More Authors

Abstract

The current study aims to identify the resilience of university students, as well as identify the differences in resilience according to the variable of gender and specialization. The research sample consisted of (382) students studying at Baghdad University. To measure Resilience, a questionnaire of (48) items was designed to collect the needed data. The results showed that the students of the University of Baghdad possess resilience. There are no differences in resilience according to gender and specialization.

View Publication Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Acute abdomen during pregnancy in Baghdad
...Show More Authors

BackgroundThe diagnosis and important aspects in treating acute abdomen during pregnancy tend to be delayed due to the peculiar physiological features of pregnancy and the restrictions imposed on imaging diagnostic techniques such as x-ray and CT.Aim of the studyTo identify the most common causes of acute abdomen during pregnancy and identifying the approaches for early diagnosis and to take a correct decision for surgery and assigning the complications that may occur during and/or after surgery for the mother and the fetus.Patients and Methods This is a prospective study that involves data obtained from 91 pregnant patients admitted in the surgical wards in Baghdad teaching hospital during the period from January 2008 to December 2009 .

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Upgrading Sharky Baghdad Heavy Crude Oil
...Show More Authors

Shaky Baghdad heavy crude oil 22 API is processed by distillation and solvent extraction. The purpose of distillation is to separate the light distillates    (light fractions) which represent 35% of heavy crude oil, and to obtain the reduced crude oil. The heavy residue (9 API) is  extracted with Iraqi light naphtha to get the deasphaltened oil (DAO), the extraction carried out with temperature range of 20-75 oC, solvent to oil ratio 5-15:1(ml:g) and a mixing time of 15 minutes. In general, results show that API of DAO increased twice the API of reduced crude oil while sulfur and metals content decreased 20% and 50% respectively. Deasphaltened oil produced from various operating conditions blended with the

... Show More
View Publication Preview PDF