Preferred Language
Articles
/
bsj-625
Developing of bacterial mutagenic assay system for detection
...Show More Authors

Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Developing an Automated Vision System for Maintaing Social Distancing to Cure the Pandemic
...Show More Authors

The world is currently facing a medical crisis. The epidemic has affected millions of people around the world since its appearance. This situation needs an urgent solution. Most countries have used different solutions to stop the spread of the epidemic. The World Health Organization has imposed some rules that people should adhere. The rules are such, wearing masks, quarantining infected people and social distancing. Social distancing is one of the most important solutions that have given good results to confront the emerging virus. Several systems have been developed that use artificial intelligence and deep learning to track social distancing. In this study, a system based on deep learning has been proposed. The system includes monitor

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri May 31 2024
Journal Name
Research Journal Of Biotechnology
The Utility of SHBG Assay in Clinical Biochemistry for Iraqi Women
...Show More Authors

Polycystic ovarian syndrome, additionally called PCOS is the most widespread endocrine illness amongst women. The aetiology of PCOS is attributed to a multi-factorial interplay among environmental and genetic effects. The overarching goal evaluates the correlation among blood concentrations of total testosterone, sex-hormone-binding globulin (SHBG), estradiol (E2), follicle-stimulating hormone (FSH) and luteinizing hormone (LH) in ladies with PCOS and the impact of obesity, age, marital popularity on the obtained results. This study was conducted at the National Center for Educational Laborites /Medical City/ Baghdad. The study comprised of a sample of 83 women, elderly between 17 -45 years, who had been selected in a random manner

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Detection of Bacterial Resistance Genes from Neonatal’s Incubators Environment at Selected Sites of Baghdad Hospitals
...Show More Authors

Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Detection of Bacterial Resistance Genes from Neonatal’s Incubators Environment at Selected Sites of Baghdad Hospitals
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Fire
An Efficient Wildfire Detection System for AI-Embedded Applications Using Satellite Imagery
...Show More Authors

Wildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob

... Show More
View Publication
Scopus (23)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Developing System of Solid Waste Management (Applied Research in Hilla City)
...Show More Authors

Abstract

The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa

... Show More
View Publication Preview PDF
Crossref