Preferred Language
Articles
/
bsj-641
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
GIS as A Tool for Expansive Soil Detection at Sulaymaniyah City
...Show More Authors

Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Electronically Implementation and Detection of Pulse Laser from Continuous Laser Diode
...Show More Authors

This research aims to design a high-speed laser diode driver and photodetector, the result is the
design of the high-speed laser diode driver with a short pulse of 10 ns at 30 KHz frequency and the
delivered maximum pulse voltage is 5.5 mV. Also, its optical output power of the laser diode driver is
about 2.529 mW for the centroied wavelength 1546.7 nm with FWHM of 286 pm and (1270-1610) nm.
The design of the circuit based on bipolar transistor where the input pulse signal is simply generated by
an arduino kit with 15 kHz frequency and then compensated to trigger to small signal amplifier which
was is simply NPN C3355 transistor and the output is a current driver to the laser diode. OptiSystem
software and Electronic

... Show More
View Publication Preview PDF
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An Effective Hybrid Deep Neural Network for Arabic Fake News Detection
...Show More Authors

Recently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (20)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detection of Nutrients and Major Ions at Al Muthanna Storage Site Soil
...Show More Authors

In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 03 2016
Journal Name
Nanoscience And Nanotechnology
Fabrication of Functionalize Reduce Graphene Oxide and Its Application in Ampicillin Detection
...Show More Authors

Graphene oxide (GO) was prepared from graphite (GT) with Hammer method, the GO was reduced with hydrazine hydrate to produce a reduced graphene oxide (RGO). The RGO was reacted with thiocarbohydrazide (TCH) to functionalize the RGO with 4-amino-3-symbol-1h-1, 2, 4-triazol-5 (4H) –thion group and to obtain (RGOT). All the prepared nanomaterial and the product of the functionalization RGOT were characterized with Fourier transformer infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) analysis. RGOT mixed with ultrasonic device at different pH values of phosphate buffer solution (PBS), the mixture used to modifying a screen printed carbon electrodes SPCE and with cyclic voltammetry the sensitivity of selectivity of the new modifying elect

... Show More
Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Enhancement of gas response of annealed ZnO film for hydrogen gas detection
...Show More Authors

  The mechanism of hydrogen (H2) gas sensor in the range of 50-200 ppm of RF-sputtered annealed zinc oxide (ZnO) and without annealing was studied. The X-ray Diffraction( XRD) results showed that the Zn metal was completely converted to ZnO with a polycrystalline structure. The I–V characteristics of the device (PT/ZnO/Pt) measured at room temperature before and after annealing at 450 oC for4h, from which a linear relationship has been observed. The sensors had a maximum response to H2 at 350 oC for annealing ZnO and showed stable behavior for detecting H2 gases in the range of 50 to 200 ppm. The annealed film exhibited hig

... Show More
View Publication Preview PDF
Crossref (2)
Crossref