Preferred Language
Articles
/
joe-2022
3-D OBJECT RECOGNITION USING MULTI-WAVELET AND NEURAL NETWORK
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as compared with matching by minimum distance, gave (94%) and (83%) score by using group (1), (gp) and features respectively, which is much better than the minimum distance. Recognition using (gp) neural network (NN) gave a (94%) and (72%) score by using group (2), (gp) and features respectively, while the minimum distance gave (11%) and (33%) scores. Time consumption
through the recognition process using (NN) with (gp) is less than that minimum distance.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Estimation the reliability function of multi state system by using Direct Partial Logic Derivative
...Show More Authors

In this research is estimated the function of reliability dynamic of multi state systems  and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 10 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ENCAPSULATION OF OMEGA-3 FATTY ACID USING NANOTECHNOLOGY TO IMPROVE ITS THERMAL STABILITY AND USE IT TO ENRICHING THE YOGURT: ENCAPSULATION OF OMEGA-3 FATTY ACID USING NANOTECHNOLOGY TO IMPROVE ITS THERMAL STABILITY AND USE IT TO ENRICHING THE YOGURT
...Show More Authors

Concentrations 25, 50 and 100 mg of nano-capsules linolenic acid and non-capsulated fatty acid for 1kg of Milk was used for yogurt manufacture. The results showed no significant differences in the ratio of titration acidity and pH values between all processed treatments at the beginning and during of period storage. The treatments was added to it coated omega-3 by nano method were the least exposed to the oxidation process from the non-capsules omega-3, And for shield of The poly lactic acid had a significant role in the protection of alpha-linolenic acid against lipolysis by the formation of a protective layer to protect the acid from the activity of lipases enzymes, and the addition of fatty acid linolenic to milk was determined the gr

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis and Characterization of 1, 3-Oxazepine and Benz [1, 2-e][1, 3] Oxazepine-4, 7-Diones
...Show More Authors

N-Benzylidene m-nitrobenzeneamines (Schiff bases) were prepared by condensation of m-nitroaniline with aromatic aldehydes. These Schiff bases were found to react with maleic anhydride to give 2-Aryl-3-(m-nitrophenyl)-2, 3-dihydro [1, 3] oxazepine–4, 7–diones and with phthalic anhydride to give 2-Aryl-3–(m-nitrophenyl)–2, 3–dihydrobenz|| 1, 2-e|||| 1, 3] oxazepine–4, 7-diones which were reacted with pyrrolidine to give the anilide–pyrrolidides of maleic acid and phthalic acid.

Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Assessing EFL Learners Ability in the Recognition And Production of Homophones
...Show More Authors

This study deals with the orthographic processing ability of homophones
which can account for variance in word recognition and production skills due to
phonological processing. The study aims at: A)Investigating whether the students
can recognize correct usage and spelling comprehension of different homophones
by using appropriate word that overlapped in both phonology and orthography.
B)Assessing spelling production word association to the written form of the
homophone in the sentence comprehension task. To achieve these aims, two tests
have been conducted and distributed on 50 students at first stage at the College of
Education(Ibn-Rushd) for the academic year 2010-2011. The two tests are exposed
to a jury of

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2012
Journal Name
Journal Of The College Of Education For Women
Assessing EFL Learners Ability in the Recognition and Production of Homophones
...Show More Authors

This study deals with the orthographic processing ability of homophones which can account for variance in word recognition and production skills due to phonological processing. The study aims at: A )Investigating whether the students can recognize correct usage and spelling comprehension of different homophones by using appropriate word that overlapped in both phonology and orthography. B )Assessing spelling production word association to the written form of the homophone in the sentence comprehension task. To achieve these aims, two tests have been conducted and distributed on 50 students at first stage at the College of Education(Ibn-Rushd) for the academic year 2010-2011. The two tests are exposed to a jury of experts for the purpose of

... Show More
View Publication
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Biochem. Cell. Arch.
SYNTHESIS AND CHARACTERIZATION OF SOME NEW METALS COMPLEXES OF 2-(3-ACETYLTHIOUREIDO)-3-PHENYLPROPANOIC ACID (APA)
...Show More Authors

ABSTRACT : A new ligand [ 2- (3-acetylthioureido)-3-phenylpropanoic acid (APA) is synthesized by reaction of acetyl isothiocyanate with phenylalanine (1:1). It is characterized by micro elemental analysis (C.H.N.S.), FT-IR, (UV-Vis) and 1H and 13CNMR spectra. Some metals ions complexes of this ligand were prepared and characterized by FT-IR, UV-Visible spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From results obtained, the following formula [M(APA)2] where M2+ = Mn, Co, Ni, Cu, Zn, Cd and Hg, the proposed molecular structure for these complexes as tetrahedral geometry, except copper complex is has square planer geometry.

Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref