Preferred Language
Articles
/
uBfOP48BVTCNdQwCnma5
Enhancement of LBP-based face identification system by adopting preprocessing techniques
...Show More Authors

Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without applying any filter) to 98.5% when applying a combination of Bilateral filter, Histogram Equalization and Tan and Triggs Algorithm. Finally, the results show degradation in accuracy and increasing in recognition time if images database get bigger.

View Publication
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Cooling and Heating a Greenhouse in Baghdad by a Solar Assisted Desiccant System
...Show More Authors

Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Development of Intelligent Control Strategy for an Anesthesia System Based on Radial Basis Function Neural Network Like PID Controller
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
المؤتمر العلمي التخصصي الحادي والعشرون لكلية التربية/ الجامعة المستنصرية 22-23 نيسان 2015 الفيزياء
Computer Simulations of Imaging a Dirac Delta Function by a Ground-Based Optical Telescope
...Show More Authors

Two- dimensional numerical simulations are carried out to study the elements of observing a Dirac point source and a Dirac binary system. The essential features of this simulation are demonstrated in terms of the point spread function and the modulation transfer function. Two mathematical equations have been extracted to present, firstly the relationship between the radius of optical telescope and the distance between the central frequency and cut-off frequency of the optical telescope, secondly the relationship between the radius of the optical telescope and the average frequency components of the modulation transfer function.

Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computing
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api
...Show More Authors

Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 04 2020
Journal Name
Al-kindy College Medical Journal
Epidemiological Characteristics of Animal Bite Cases Recorded by Case based Surveillance in Iraq 2012
...Show More Authors

Background: Animal bite is one of the public health problems all over the world, especially in poor countries. Animal bites have an impact on human health due to rabies disease, which is a viral transmitted disease from animal to human with a high mortality rate.
Objective: To determine the epidemiological characteristics of animal bite cases by person, time, and place.
Method: Descriptive cross sectional study was done by reviewing cases caused by animal bites., Data including the demographic characteristics of age, gender, occupation, site of bite, and attending health institutions searching treatment were all included.
Results: There were 11600 animal bite cases. Most of bites caused by stray dogs 11577(99.8%), and the males

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Vegueta
the role of religious satellite channels in adopting the values of moderation and moderation among the audience of the city of bghdad
...Show More Authors

Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Prevent administrative and financial corruption behaviors by activating the functions of the organizational immunity system
...Show More Authors

The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The face of the pressures of life styles to Riyadh parameters and the relationship with some variables
...Show More Authors

I noticed a researcher while working in the kindergarten that there is a group of
parameters resort to the use of different methods may be some undesirable and some
undesirable So felt researcher detection methods used parameters Riyadh in the face of the
pressures of life, being engaged in kindergarten eligibility, governmental or being married or
unmarried, as well as educational attainment for this parameter.
To achieve the objectives of the research: -
The researcher prepare a scale methods face the pressures of life of the parameters
have been confirmed the veracity of the paragraphs of the scale of the presentation to a group
of experts in this area, and extracted power discriminatory clauses scale and extra

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Experimental investigation and modelling of residual stresses in face milling of Al-6061-T3 using neural network
...Show More Authors

Milling process is a common machining operation that is used in the manufacturing of complex surfaces. Machining-induced residual stresses (RS) have a great impact on the performance of machined components and the surface quality in face milling operations with parameter cutting. The properties of engineering material as well as structural components, specifically fatigue life, deformation, impact resistance, corrosion resistance, and brittle fracture, can all be significantly influenced by residual stresses. Accordingly, controlling the distribution of residual stresses is indeed important to protect the piece and avoid failure. Most of the previous works inspected the material properties, tool parameters, or cutting parameters, bu

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref