Preferred Language
Articles
/
24YIdYYBIXToZYALCYpL
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels with a medium validity of 76%. There are two kinds of methods, manual and automated, for distress evaluation that are used to assess pavement condition. A committee of three expert engineers in the maintenance department of the Mayoralty of Baghdad did the manual assessment of a highway in Baghdad city by using a Pavement Condition Index (PCI). The automated method was assessed by processing the videos of the road. By comparing the automated with the manual method, the accuracy percentage for this case study was 88.44%. The suggested method proved to be an encouraging solution for identifying cracks and potholes in asphalt pavements and sorting their severity. This technique can replace manual road damage assessment.

Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (34)
Crossref (21)
Scopus Crossref
Publication Date
Sun Dec 27 2020
Journal Name
Journal Of The College Of Education For Women
Using the Image in Teaching Arabic Language Vocabulary to Non-Native Speakers: The Experience of the Arabic Language Institute - King Abdul-Aziz University - as a Model: آمال موسى عباس الإمام
...Show More Authors

The study aims to demonstrate the importance of instructional methods in teaching Arabic language as a second language or teaching the Arabic language to non-native speakers. The study is in line with the tremendous development in the field of knowledge, especially in the field of technology and communication, and the emergence of many electronic media in education in general and language teaching in particular. It employs an image in teaching vocabulary and presenting the experience of the Arabic Language Institute for Non-Speakers-King Abdul-Aziz University. The study follows the descriptive approach to solve the problem represented by the lack of interest in the educational methods when teaching Arabic as a second language. Accordingl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Auditor's Evaluation of The Detected Misstatements and Their Reflection on The Administration's Actions is: an Applied Research in the General Company for Grain Processing
...Show More Authors

Some auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones.  The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Detection of Commercial Cheating for Some Kinds of Local Markets retailed Medicinal Oils: Detection of Commercial Cheating for Some Kinds of Local Markets retailed Medicinal Oils
...Show More Authors

The aims of this study are to explore the commercial artifacts in the following three kinds of vegetables oils, Nigella Sativa, Trigonella foenum-graecum Linn,and Zingiber officinale. These oils have been very popular medicinal plants which are commonly used in traditional medicine .These commercial oils have been compared with the extracts of these plants.
The physical properties of extracts and commercial oils of these plants have been stuied. We observed that the refractive index of the plants matches and non-significant, while specific gravity of Nigella Sativa has similar specific gravity in both extracts and commercial oil in contrast with Trigonella foenum Linn,and Zingiber officinale and we found significant difference (P&lt

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 19 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS: DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS
...Show More Authors

The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.

View Publication Preview PDF
Publication Date
Sat Jan 31 2026
Journal Name
Webology
Is the Stealth Marketing an Element of Promotion Mix? A Review of the Techniques
...Show More Authors

Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the

... Show More
View Publication
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Techniques of Acting Performance in Fantasy Theatrical Show: راسل كاظم عوده-ليلى فؤاد فاضل
...Show More Authors

     This research deals with the fact that arts exit from their familiar context in practice and enter in the context of the fantasy and exoticism picture. In order to understand the theatrical phenomenon and know the way of its production of the fantasy picture, especially the acting performance in its transitions between the real and fantasy. This study consists of: an introduction of the research in which the researcher presented the research problem, importance and objectives.  

    The theoretical framework dealt with founding a theoretical part for the research consisting of two sections: the first (fantasy: the concept and the working) and the second (techniques of acting perfo

... Show More
View Publication Preview PDF
Crossref