Preferred Language
Articles
/
1WFWHpkBdMdGkNqjuRMp
Automatic COVID-19 Detection from Chest X-ray using Deep MobileNet Convolutional Neural Network
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Nov 15 2024
Journal Name
Scientific Reports
Ag@WO3 core–shell nanocomposite for wide range photo detection
...Show More Authors

This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 02 2014
Journal Name
Journal Of Theoretical And Applied Information Technology
TUMOR BRAIN DETECTION THROUGH MR IMAGES: A REVIEW OF LITERATURE
...Show More Authors

Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin

... Show More
Scopus (48)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Iraqi Journal Of Hematology
Detection of active human cytomegalovirus in patients with multiple myeloma
...Show More Authors
Abstract:<sec><title>BACKGROUND:

Human cytomegalovirus (HCMV) infection is ubiquitous and successfully reactivated in patients with immune dysfunction as in patient with multiple myeloma (MM), causing a wide range of life-threatening diseases. Early detection of HCMV and significant advances in MM management has amended patient outcomes and prolonged survival rates.

OBJECTIVES:

The aim of the study was to estimate the frequency of active HCMV in MM patients.

MATERIALS AND METHODS:

This is a case–control study involved 50 MM patients attending Hematology Center, Bag

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2003
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
OCCURRENCE OF SOME FISH PARASITES IN AL-MADAEN DRAINAGE NETWORK, SOUTH OF BAGHDAD
...Show More Authors

Seven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Low Power Electronics And Applications
Tolerating Permanent Faults in the Input Port of the Network on Chip Router
...Show More Authors

Deep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f

... Show More
View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Simulation and assessment of water supply network for specified districts at Najaf Governorate
...Show More Authors
Abstract<p>This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand </p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref