كلية العلوم
بحوث التدريسيين لـ قسم تكنولوجيا المعلومات

بحوث التدريسيين لـ قسم تكنولوجيا المعلومات

أ.م.د جين جليل اسحق (0 بحث)
لا توجد بحوث منشورة للتدريسي
مهند علي متعب (2 بحث)
A Comparative study of Android and iPhone Operating System main languages
2020 Solid State Technology
مصطفى فيصل (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.م ساره سلمان قاسم (3 بحث)
Deep Learning Machine using Hierarchical Cluster Features
2019 Al-Mustansiriyah Journal of Science

Deep learning of multi-layer computational models allowed processing to recognize data representation at multiple levels of abstraction. These techniques have greatly improved the latest ear recognition technology. PNN is a type of radiative basis for classification problems and is based on the Bayes decision-making base, which reduces the expected error of classification. In this paper, strong features of images are used to give a good result, therefore, SIFT method using these features after adding improvements and developments. This method was one of the powerful algorithms in matching that needed to find energy pixels. This method gives stronger feature on features and gives a large number of a strong pixel, which is considered a center and neglected the remainder of it in our work.
Each pixel of which is constant for image translation, scaling, rotation, and embedded lighting changes in lighting or 3D projection. Therefore, the interpretation is developed by using a hierarchical cluster method; to assign a set of properties (find the approximation between pixels) were classified into one.

Encrypt Medical Image using CSalsa20 Stream Algorithm
2020 Medico Legal Update

As a result of the tremendous development in the field of information technology and the internet and exposure to a flood of violations to circumvent and steal information organized and unorganized. The urgent need for the emergence of data protection technologies and data encryption techniques. As a result of the tremendous development in the field of information technology and the internet and exposure to a flood of violations to circumvent and steal information organized and unorganized. The urgent need for the emergence of data protection technologies and data encryption techniques one of these methods, The Salsa20 encryption stream and all of its reduced versions Salsa20 / 7 and Salsa20 / 12 are among the fastest stream ciphers today. In this paper, the Salsa20 method is therefore improved by adding a new variable by using chaos theory which can achieve faster propagation than the original Salsa20 and has been applied by encrypting medical images that need confidentiality because some patients do not want anyone to know about a disease so the patient’s medical data is encrypted and no one can access it. This method has been tested and measured with the original Salsa20 with a series of tests. Most tests show that the proposed messy salsa is faster than the original salsa

Force Field Feature Extraction Using Fast Algorithm for Face Recognition Performance
2021 Journal of Physics: Conference Series

Face recognition is method of recognizing individuals by facial expressions. It has become essential for security and surveillance applications, including banks, organisations, workplaces, and social areas, and is needed everywhere. In face recognition, there are a variety of difficulties faced, including face shape, age, sex, lighting, and other variable factors. Another problem is that the scale of the servers for these apps is relatively limited. Education and acknowledgment, thus, are increasingly complicated. In recent years, many unchanged features have been proposed in the literature, in this paper approach the use of the fast algorithm as local descriptors, and as we shall see, it is not only fixed-size features, but also offers the advantage of being highly efficient. The proposed approach allows distinguishing the destination after converting the image to the HSV system, after which the force field features will be extracted using the fast algorithm and then classification by using the distance for three methods (Manhattan, Euclidean, and Cosine) through which a comparison is made to choose the best resolution, as it was found that the resulting accuracy of the two dataset (ORL and UFI) is 99.9%.

شجن محمد مهدي (0 بحث)
لا توجد بحوث منشورة للتدريسي
اسماء حسن محسن (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.د حيدر فاضل عباس (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.م محمد كريم عبد (1 بحث)
Secure Medical Image Steganography Method Based on Pixels Variance Value and Eight Neighbors
2021 2021 International Conference on Advanced Computer Applications (ACA)

The security aspect of processes and methodologies in the information and communication technology era is the main part. The security of information should a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography, watermark, and cryptography. In cryptography, the secrete message is converted into unintelligible text, but the existence of the secrete message is noticed, on the other hand, watermarking and steganography involve hiding the secrete message in a way that its presence cannot be noticed. Presently, the design and development of an effective image steganography system are facing several challenges such as the low capacity, poor robustness and imperceptibility. To surmount these challenges, a new secure image steganography work called the Pixels Variance (PV) method is proposed along with the eight neighbors method and Huffman coding algorithm to overcome the imperceptibility and capacity issues. In proposed method, a new image partitioning with Henon map is used to increase the security part and has three main stages (preprocessing, embedding, and extracting) each stage has different process. In this method, different standard images were used such as medical images and SIPI-dataset. The experimental result was evaluated with different measurement parameters such as Peak signal-to-noise ratio (PSNR) and Structural Similarity Index (SSIM). In short, the proposed steganography method outperformed the commercially available data hiding schemes, thereby resolved the existing issues.

م.م طه يوسف محمد (0 بحث)
لا توجد بحوث منشورة للتدريسي
ايات محمد ناصر (0 بحث)
لا توجد بحوث منشورة للتدريسي
اسراء مازن حسن (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.م يونس عبد الكريم محمد (1 بحث)
Privacy and Security in Big Data, Categories, Issues, and Proposed Solutions
2022 JOURNAL OF MADENAT ALELEM COLLEGE

Abstract

In recent years, one of the most contentious issues has been "big data." Unstructured and semi-structured data may be found in many locations, including web servers, mobile devices, and social media sites, for many organizations and enterprises, the security and privacy of large data are becoming more critical, and the increased usage of big data puts data security and privacy at odds. Large-scale data sharing raises new privacy and security issues. Big data doesn't work with traditional methods or techniques. Analyzing large amounts of data encourages the collection and long-term storage of more complete and durable data. By combining private data with other private data, it is possible to reveal the personal information of its customers more easily. The sharing of massive data opens the door to new problems. It necessitates the use of high-tech methods and tools because they create so many data security issues. As part of our review of Big Data privacy and security the most recent methods, mechanisms, and solutions for protecting data-intensive systems were discussed. we looked at the most important terms to define and classify, in this paper, big data security and privacy researchers will benefit from this review because it identifies key trends and general terms, as well as current privacy and security concerns. And we also highlighted common solutions to these problems included.

Keywords

PrivacySecurityBig Data
ذكرى عبد الجليل كريم (0 بحث)
لا توجد بحوث منشورة للتدريسي
رند فؤاد مجيد (0 بحث)
لا توجد بحوث منشورة للتدريسي
بحوث التدريسيين لـ قسم الادلة الجنائية

بحوث التدريسيين لـ قسم الادلة الجنائية

م.د عزيز لطيف جار الله (1 بحث)
Investigation of the effect of food types on melatonin hormone level in human body
2021 Medical Journal of Babylon

Background: Melatonin, a neurohormone produced by the pineal gland, has recently been reported in foods, mainly of plant origin. Melatonin provides a number of benefits for human health. It has many important health benefits because it is a potent antioxidant and anti-inflammatory hormone. Objectives: The aim of this work is to investigate the relationship between malnutrition and food deprivation on melatonin levels in normal individuals in comparison with people suffering from gastrointestinal diseases. This study will focus on the nutritional factors apart from the intake of tryptophan that affects melatonin levels in humans. Materials and Methods: This study reported interests regarding the optimization, validation, and application of analytical liquid extraction and high-performance liquid chromatography (SYKAM) coupled to a fluorescence detector for the determination of melatonin in rice grains and blood samples. Results: In the present study, the results showed that there were significant differences between the three study groups, where the lowest values for melatonin hormone concentration were found in Group C as 2.033 ± 0.69 pg/mL which includes people suffering from famine, whereas the results of Group B showed clear differences of concentration than that in Group (C) as 3.520 ± 0.62 pg/mL which includes patients who were in hospital suffering from diseases and disorders of the digestive system, but at the same time their values were less than that of the healthy control Group A as 6.457 ± 0.59 pg/mL. Conclusion: Based on the present study, it can be concluded that melatonin hormone levels are highly deficient in people who are suffering from poverty, deprivation, and starvation compared to people with problems and disorders of the digestive system.

م.م. زهراء صلاح مصطفى كمال (5 بحث)
أهمية الذكاء الاصطناعي و معوقاته من في تدريس مادة الكيمياء للمرحلة المتوسطة وجهة نظر مدرسي الكيمياء
2024 Rihan Journal for Scientific Publishin
هدف البحث الحالي الى التعرف على أهمية تفعيل الذكاء الاصطناعي في تدريس مادة الكيمياء من وجهة نظر مدرسي الكيمياء، ومعوقات تفعيل الذكاء الاصطناعي في تدريس مادة الكيمياء من وجهة نظر مدرسي الكيمياء ، استخدمت الباحثة المنهج الوصفي ( المسحي ) لمناسبته لطبيعة البحث، ولتحقيق هدف البحث تم بناء مقياس الذكاء الاصطناعي مكون من 35 فقرة موزعة على مجالين ( المجال الأول: أهمية تفعيل الذكاء الاصطناعي في تدريس مادة الكيمياء ويضم 18 فقرة، اما المجال الثاني: معوقات تفعيل الذكاء الاصطناعي في تدريس مادة الكيمياء ويضم 17 فقرة ) وتم التحقق من صدق بعرضه على مجموعة من المحكمين متخصصين في مجال طرائق التدريس و علم النفس التربوي والقياس والتقويم، وتم تطبيقه على عينة مكون من 169 مدرس ومدرسة للفصل الدراسي الأول للعام الدراسي 2023- 2024، وجاءت النتائج ظهور مجال أهمية تفعيل الذكاء الاصطناعي في تدريس مادة الكيمياء بدرجة مرتفعة ، ومجال معوقات تفعيل الذكاء الاصطناعي في تدريس مادة الكيمياء بدرجة مرتفعة ، وبناءً على ذلك تقدمت الباحثة بمجموعة من التوصيات وجملة من المقترحات وفقاً للنتائج التي توصلت اليها. الكلمات المفتاحية: الذكاء الاصطناعي، مدرسي مادة الكيمياء، المرحلة المتوسطة.
The availability of concepts and applications of artificial intelligence in the content of the chemistry textbook for the fourth scientific grade
2024 International Journal of Literacy and Education
Abstract The goal of the current research is to know the extent to which the concepts and applications of artificial intelligence are included in the content of the chemistry textbook for the fourth scientific grade. To achieve the research goal, the researcher developed the analysis list (Al-Fayez, Al-Othman, and Al-Malhi, 2021) that includes five main applications and 27 sub-applications distributed among the main applications, and adopted The researcher used the descriptive method of content analysis, as the research community and its sample were from the chemistry textbook for the fourth scientific grade approved by the Iraqi Ministry of Education for the academic year 2023-2024 AD, and to verify the psychometric properties of the analysis list, it was presented to a group of arbitrators with specialization (curricula, teaching methods). Then the researcher analyzed the content of the book in light of it, relying on the explicit and implicit idea as a unit for recording and repetition as a unit for enumeration. The results of the analysis were that the book included (46) repetitions distributed unevenly over the five applications. According to what was mentioned, the researcher presented a set of recommendations and a number of proposals based on the results she reached to her. Keywords: Artificial intelligence, artificial intelligence concepts, artificial intelligence applications, chemistry book
Analysis of the content of "the chemistry book for the third intermediate grade" according to cognitive agility
2024 المجلة العلمية للعلوم التربوية والصحة النفسية
Abstract: The current research aims to analyze the content of the book “Chemistry for the Third Intermediate Grade” according to cognitive agility. To achieve the goal of the research, the two researchers built a content analysis tool for cognitive agility. The tool included three dimensions, namely (cognitive openness, cognitive flexibility, and focus of attention), and then derived 30 indicators from them, to be sure. To ensure the validity of the tool, it was presented to a number of experts in the field of teaching methods, measurement and evaluation, and curricula. To achieve the goal of the research, the two researchers followed the descriptive approach. The population and sample for the research were from the book “Chemistry for the Third Intermediate Grade” for the academic year (2022-2023), then they were used. The analysis tool was prepared based on the idea (explicit and implicit), as a unit for recording, repetition, and enumeration for content analysis. To extract the validity of the analysis, a model was randomly selected from the analyzed material and presented to the experts who agreed on the validity of the analysis process. The stability of the analysis was calculated using the Holiste equation and the results were as follows. Content analysis included 82 repetitions in the book, distributed unevenly across the three dimensions. Accordingly, the two researchers presented a set of recommendations and a number of proposals in accordance with the results. reached by the two researchers. Keywords: cognitive agility ; content analysis ; textbook
م.م منار جبار كاطع (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.م. ريام صادق جودة (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.م صاحب عباس الكبيسي (0 بحث)
لا توجد بحوث منشورة للتدريسي
نور صباح حمود (0 بحث)
لا توجد بحوث منشورة للتدريسي
سعدية عثمان محمد قربان (0 بحث)
لا توجد بحوث منشورة للتدريسي
احمد حامد حسين (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.م غفران عاشور حمود (1 بحث)
Synthesis and Characterization of New Graphene Oxide Nano Derivatives, as well as their Biological Activities
2021 International Journal of Drug Delivery Technology
م.م رقية اياد عباس (0 بحث)
لا توجد بحوث منشورة للتدريسي
هيئة تدريسية - مستقيل (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.د سديف محمد كامل محمد (0 بحث)
لا توجد بحوث منشورة للتدريسي
بحوث التدريسيين لـ قسم علوم الامن السيبراني

بحوث التدريسيين لـ قسم علوم الامن السيبراني

م.م عادل محمد علوان (0 بحث)
لا توجد بحوث منشورة للتدريسي
أ.د كاظم بريهي سوادي الجنابي (50 بحث)
Improving Cyber-Attacks Detection Algorithms Using Parallel Approach for Machine Learning Techniques
2024 CDI2024
Traditional decision tree and Naive Bayes algorithms might face challenges when handling huge data due to various limitations such as Computational Complexity, Scalability, Data Storage, and I/O Operations While these challenges exist, numerous methods and adaptations have been proposed to address these limitations, the most common solution is parallelization using Hadoop environment which optimizing the algorithms for parallel manner. Algorithms can be implemented in Hadoop using a map-reduce programming model. Map Reduce job can be configured to use either a single reducer or multiple reducers. The number of reducers can significantly impact the efficiency, execution time, and performance of a Map Reduce job. Not all machine learning algorithms can naturally or easily be split across multiple reducers due to their inherent characteristics and computations. In this paper, the multi-reducers Map-Reduce job is used to compute the information gain, where each reducer calculates the information gain of one feature. On the other hand, Naïve Bayes can be implemented in multi reducers, where the training phase of n features can be done in n reducers Hadoop job. This study revolves around a malware detection dataset as the primary subject. The research employed ANOVA feature selection to discern the most informative attributes, a pivotal step preceding data preprocessing. The dataset underwent a scaling (z-score normalization) process to enhance its classification readi-ness, resulting in a marked improvement in accuracy. Initially standing at 88%, the accuracy surged to 95% post-scaling. Notably, the research delved into leveraging parallelism in the Hadoop streaming framework. The proposed system was implemented, dedicating individual reducers for each feature, aligning with the dataset's feature count. This strategic parallelism approach was instrumental in the training phase, enhancing system efficiency and performance. Keywords: Cybersecurity, Decision tree, Information gain, Naïve Bayes, Hadoop streaming
A Distributed Approach for Implementing Multi-Linear Regression Using Gradient Descent: Toward Efficient Cyber Attacks Detection Algorithms
2024 CDI2024
Implementing multilinear regression using gradient descent in Hadoop streaming with multiple reducers can indeed help reduce the required time for computation, especially when dealing with large datasets. Hadoop's main advantage lies in its ability to distribute computations across multiple nodes. When performing multilinear regression using gradient descent, this distributed processing capability can be leveraged to divide the dataset into chunks and perform computations simultaneously on different nodes (reducers in Hadoop's context). Using multiple reducers means that different parts of the computation can be carried out concurrently. Each reducer can handle a subset of the data, performing computations independently. This parallel processing reduces the overall computation time significantly compared to a single-reducer or non-distributed approach. This will avoids the bottleneck of processing massive datasets on a single reducer. The work in this paper proposes a method that Leeds to careful algorithm design to ensure convergence and accuracy while considering the distributed nature of the computation. Handling updates to coefficients and convergence criteria across multiple reducers. Speed of algorithms can be useful in different real-world applications especially in on line detecting of malicious attacks and hence, cybersecurity represents a most important field were the proposed work can be applied. The results obtained from this work showed that an improvement was achieved in processing time of huge amount of data, and hence applications with on line processing such as detecting malicious attacks in cybercrimes will use such approach. Generation synthetic big dataset with size ten million record, Initialization multi linear regression using gradient descent algorithm to work with Hadoop environment, and using multi reducers Hadoop map reduce job to decrease execution time and get low error are the main outcomes of this work. Keywords: Big Data, Hadoop Streaming, MapReduce, Linear Regression.
Cyber Attacks Detection and Type Prediction for Cloud System Using Machine Learning Techniques
2024 CDI2024
Cyber security and Cloud platforms are utilized in various usage and applications in today’s world. Given the wide range of applications, and the ease of usage they provide, the popularity of them are increasing dramatically. Leading many individuals and organizations to depend on them mainly. Securing data, hardware, networks and other resources from cyber-attacks represent a crucial factor for these organizations. The work in this paper proposes an approach of multiple stages to detect and predict the cyber -attacks types aiming to enforce higher security procedures to secure the organization resources in general and data in specific. The approach first stage is the data collection where Meraz dataset available on the internet is used, and then different levels of preprocessing were conducted. The third stage is to apply different classification algorithms to group the attacks into malicious or not. Then after, the data related to the classifier that yield optimum classification results is selected for next level of knowledge extraction where hierarchical clustering was applied. The clustering is built on the malware samples of test dataset only. This dataset is divided into training and testing samples. A 10% of the dataset was used to predict the malware type. Hierarchical clustering was used with various configurations. The reason for using clustering is to predict the attack type by assigning each attack for distinct cluster. The proposed approach gave 98.88% of accuracy with Random Forest classifier and a reliable results for clustering were using Hierarchical clustering by using Euclidean distance metric, and ward linkage, The prediction values were as follows{0: 10671, 1: 3603, 2: 824}.The results obtained gave a novel approach for developing Machine Learning solution for cloud systems security. With this novel solution, the limitations of the traditional solutions are solved. Keywords: Cyber Security, Cloud System, Cyber Attacks, Machine Learning, Classification, Clustering
بحوث التدريسيين لـ قسم علوم الفيزياء الطبية

بحوث التدريسيين لـ قسم علوم الفيزياء الطبية

أ.د عصام عبد العزيز محمد (0 بحث)
لا توجد بحوث منشورة للتدريسي
بحوث التدريسيين لـ قسم علوم الحياة

بحوث التدريسيين لـ قسم علوم الحياة

م.م ندى عبد الكريم محمد (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.د بشائر عبد اللطيف عبد (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.د ساهرة حسان كريم (0 بحث)
لا توجد بحوث منشورة للتدريسي
م.م يسرى فتحي مهدي (0 بحث)
لا توجد بحوث منشورة للتدريسي