Preferred Language
Articles
/
bsj-8177
Indoor/Outdoor Deep Learning Based Image Classification for Object Recognition Applications
...Show More Authors

With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor sets, resulting in four trained models. The test sets are used to evaluate the trained models using many evaluation metrics (accuracy, TPR, FNR, PPR, FDR). Results of Google Net model indicate the high performance of the designed models with 99.34% and 99.76% accuracies for indoor and outdoor datasets, respectively. For Mobile Net models, the result accuracies are 99.27% and 99.68% for indoor and outdoor sets, respectively. The proposed methodology is compared with similar ones in the field of object recognition and image classification, and the comparative study proves the transcendence of the propsed system.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 08 2018
Journal Name
Proceedings Of The 2018 International Conference On Computing And Big Data
3D Parallel Coordinates for Multidimensional Data Cube Exploration
...Show More Authors

Visual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Geological Journal
Geological Model for Mauddud Reservoir Khabaz Oil Field
...Show More Authors

The Mauddud reservoir, Khabaz oil field which is considered one of the main carbonate reservoirs in the north of Iraq. Recognizing carbonate reservoirs represents challenges to engineers because reservoirs almost tend to be tight and overall heterogeneous. The current study concerns with geological modeling of the reservoir is an oil-bearing with the original gas cap. The geological model is establishing for the reservoir by identifying the facies and evaluating the petrophysical properties of this complex reservoir, and calculate the amount of hydrocarbon. When completed the processing of data by IP interactive petrophysics software, and the permeability of a reservoir was calculated using the concept of hydraulic units then, there

... Show More
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of Surface Diffusion Coefficient for Adsorption Process
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 06 2021
Journal Name
Journal Of Planner And Development
The Ultimate Characters For Identity In Contemporary Architecture
...Show More Authors

          General propositions have dealt with various indicators and features that frame and describe basic architectural concepts, and from those concepts, the concept of identity will be presented here, which represents the nerve of intellectual vision of the state of architecture development, transformation and change. Due to its deep intellectual basis, it was necessary to study multiple features, especially the achievement feature that was considered a major stage describing the nature of change and shift related to the achievement of concept and its role in the development of the architectural field .              &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Biochemical Characterization for Lipid Synthesis in Aspergillus niger
...Show More Authors

A niger, a fungus which doesn't have high ability to production lipid, this fungus has been select to investigate the non oleaginicity. In this search, there are explorations about: i) growth profile ii) enzymes profile iii) isoforms. Growth profile shows that this fungus doesn't have ability to accumulate lipid more than 6% while bio mass are around 10g/l in spite of the presence of glucose in the media till the end of cultivation time and excision of nitrogen within 24 hrs. In enzyme study, we investigate all lipogenic enzymes Malic enzyme (ME), Fatty acid synthase (FAS), ATP: Citrate lays (ACL), NAD+ isocitrate dehydrogenase (NAD+ICDH), Glucose-6-phosphate (G6PD), and 6-phosphogluconate dehydrogenase (6PGD), all these enzymes show, ac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 31 2025
Journal Name
Journal Of University Of Babylon For Pure And Applied Sciences
Green Chemistry for Removing Alizarin Red S Dye
...Show More Authors

 The current work utilizes the peel and pulp of the Iraqi eggplant to remove Alizarin Red S dye (ARS) from an aqueous solution. The isotherms of adsorption were studied and the factors that the effect them: temperature, the effect of surface nature and effect of ionic strength. The isotherms of adsorption of ARS on the peel were found obey the Freundlich, equation, but the isotherms of adsorption on the pulp were found to obey the Langmuir equation. At different temperatures, the adsorption process was studied, and it was found that when the temperature decreased, the adsorption increased. Based on the data we obtained in practice, the thermodynamic functions (∆H, ∆G, ∆S) were calculated as the process was exothermic, spontan

... Show More
View Publication
Crossref
Publication Date
Fri Sep 03 2021
Journal Name
Entropy
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials
...Show More Authors

Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the

... Show More
View Publication
Scopus (35)
Crossref (32)
Scopus Clarivate Crossref