Preferred Language
Articles
/
xRYc0osBVTCNdQwCquCF
Machine Learning Approach for Facial Image Detection System
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

Scopus
View Publication
Publication Date
Mon Aug 15 2022
Journal Name
American Journal Of Research In Humanities And Social Sciences
THE IMAGE OF THATCHERISM IN TOP GIRLS BY CARYL CHURCHILL
...Show More Authors

Caryl Churchill's Top Girls (1982) reveals how women have achieved a point of strength and independence in their battle to face men's oppression throughout history. Churchill has replicated recent transitions in the 1980s and 1990s in works that depict these movements' central concerns and contradictions as they change. Similarly, her theater is a result of many problems and shifts in hegemonic modes of production during this time. This paper traces the achievements of the major character of Top Girls, Marlene, in her way of life and her handling of the struggles of other women around her. Because of this strength, Marlene is compared to the British Prime Minister, Thatcher. Therefore, this paper will shed light on the term of T

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
The Image of the Anti- Hero in James Joyce's Ulysses
...Show More Authors

The hero traditionally has such admirable traits as courage, fortitude,
chivalry and patriotism. In the literary works, the hero is the leading
character and the pivot around which all the characters and the events
revolve. The characteristics of the hero usually reflect the cultural values
of his time. Because, in each age, Man's attitudes towards himself and the
world change, different images of the hero emerge.
In Greek Mythology, the hero is frequently favoured by the gods;
therefore, he is himself semi-divine. The Greek hero is of princely birth
and is endowed with good physique, exceptional strength, skill in
athletics and battle, energy and eloquence, like Odysseus who is the hero
of the Odyssey, long

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Computer Assisted Immunohistochemical Score Prediction Via Simplified Image Acquisition Technique
...Show More Authors

Background: techniques of image analysis have been used extensively to minimize interobserver variation of immunohistochemical scoring, yet; image acquisition procedures are often demanding, expensive and laborious. This study aims to assess the validity of image analysis to predict human observer’s score with a simplified image acquisition technique. Materials and methods: formalin fixed- paraffin embedded tissue sections for ameloblastomas and basal cell carcinomas were immunohistochemically stained with monoclonal antibodies to MMP-2 and MMP-9. The extent of antibody positivity was quantified using Imagej® based application on low power photomicrographs obtained with a conventional camera. Results of the software were employed

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Image Denoising Using Multiwavelet Transform with Different Filters and Rules
...Show More Authors

<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt&amp; pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Engineering
Hydraulic Characteristics and Discharge of Canal Sluice Gate: Practical Approach
...Show More Authors

Simplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref