Preferred Language
Articles
/
bsj-747
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
vStudy of Linear Shrinkage for Siliceous Materials to Meet Insulating Requirements
...Show More Authors

Iraqi siliceous rocks were chosen to be used as raw materials in this study which is concern with the linear shrinkage and their related parameters. They are porcelinite from Safra area (western desert) and Kaolin Duekla, their powders were mixed in certain percentage, to shape compacts and sintered. The study followed with thermal and chemical treatments, which are calcination and acid washing. The effects on final compact properties such as linear shrinkage were studied. Linear shrinkage was calculated for sintered compacts to study the effects of calcination processes, chemical washing, weight percentage, sintering processes, loading moment were studied on this property where the compacts for groups is insulating materials.
Linear

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Fatigue and Tensile Characteristics for Composite Materials Used in Prosthetic Socket
...Show More Authors

In this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 05 2011
Journal Name
Iraqi Journal Of Physics
Study of linear shrinkage for siliceous materials to meet insulating requirements
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Physica Medica
Quantitative analysis of sentinel lymph node detection using a novel small field of view hybrid gamma camera (HGC)
...Show More Authors

Introduction The Hybrid Gamma Camera (HGC) is being developed to enhance the localisation of radiopharmaceutical uptake in targeted tissues during surgical procedures such as sentinel lymph node (SLN) biopsy. Purpose To assess the capability of the HGC, a lymph-node-contrast (LNC) phantom was constructed for an evaluative study simulating medical scenarios of varying radioactivity concentration and SLN size. Materials and methods The phantom was constructed using two methyl methacrylate PMMA plates (8 mm thick). The SLNs were simulated by drilling circular wells of diameters ranging between 10 mm and 2.5 mm (16 wells in total) in one plate. These simulated SLNs were placed underneath scattering material with thicknesses ranging between 5 mm

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Physics: Conference Series
Determination of Radioactivity Levels in Some Rice Samples available in the Iraqi Markets Using the system of High-purity Germanium
...Show More Authors
Abstract<p>This study aimed to determine the radioactivity and radiation hazard indicators of rice samples potentially for human consumption. Gamma spectroscopy was used to calculate the specific activity of natural and artificial radionuclides (<sup>238</sup>U, <sup>232</sup>Th, <sup>40</sup>K, and <sup>137</sup>Cs) in local and imported rice samples collected from local markets in Baghdad Governorate, Iraq, in addition to various radiological hazard indices. The radionuclide concentrations in the samples varied from 2.123 ± 1.457 Bq/kg to 13.032 ± 3.610 Bq/kg for <sup>238</sup>U, 2.906 ± 1.705 Bq/kg to 17.290 ± 4.158 Bq/kg for <sup>232</sup></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref