Preferred Language
Articles
/
tBd82IwBVTCNdQwCRwgO
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix contains zeros, so the problem is to find a low-rank matrix. Matrix completion is a heuristic NP-hard problem. It is a minimization problem defined by the matrix nuclear norm. In this paper, nuclear norm, and weighted nuclear norm minimization problems are derived to find a low-rank matrix of implemented Hankel matrix from the signal. A Robust Principal Component used to solve a low-rank-sparse matrix finds a low-rank Hankel matrix by solving a minimization problem numerically. The results show that the given methods are efficient in reconstructing and recovering the signals with a rate of more than 96%, with small values of mean square errors

Scopus Crossref
View Publication
Publication Date
Sun Dec 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Green Synthesis of Silver Nanoparticles via Black and Green Tea and Study its Toxicity on few Vital Organs of Female Mice
...Show More Authors

This study included synthesizing silver nanoparticles (AgNPs) in a green method using AgNO3 solution with glucose exposed to microwave radiation. The prepared NPs were also characterized using ultraviolet and visible (UV-vis) spectroscopy and scanning electron microscopy (SEM). The UV/vis spectroscopy confirmed the production of AgNPs, while SEM analysis showed that the typical spherical AgNPs were 30 nm and 50 nm in size for the NPs prepared using black tea (B) and green tea (G) as reducing agent, respectively. The changes in some of the biochemical parameters related to the liver and kidneys have been analyzed to evaluate the probable toxic effects of AgNPs. 40 adult male mice were included in this study. To assess the probable he

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 27 2023
Journal Name
Optical And Quantum Electronics
Synthesis and study of photoelectrochromic and photocatalytic behavior of double-layer N-doped TiO2/Co3O4 configuration via DC reactive magnetron sputtering
...Show More Authors

This work introduces the synthesis and the characterization of N-doped TiO2 and Co3O4 thin films prepared via DC reactive magnetron sputtering technique. N-doped TiO2 thin films was deposited on indium-tin oxide (ITO) conducting substrate at different nitrogen ratios, then the Co3O4 thin film was deposited onto the N-doped TiO2 layer to synthesize a double-layer TiO2-N/Co3O4 Photoelectrochromic device. Several techniques were used to characterize the produces which are x-ray diffraction (XRD), field emission-scanning electron microscopy (FE-SEM), Fourier-transform infrared (FTIR) spectroscopy and UV–Vis spectroscopy. The Photoelectrochromic device was characterized by UV–Vis spectroscopy and the results show that the double-layer N-dope

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS
...Show More Authors

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Artificial Intelligent Models for Detection and Prediction of Lost Circulation Events: A Review
...Show More Authors

Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Veterinary Sciences
Isolation and molecular detection of enterotoxigenic Staphylococcus aureus from raw milk of cows
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref