Preferred Language
Articles
/
-BdiL48BVTCNdQwC8V17
Image Compression based on Quadtree and Polynomial

Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
Scopus (17)
Crossref (4)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Apr 15 2023
Journal Name
Iraqi Journal Of Science
Hand Written Signature Verification based on Geometric and Grid Features

The fact that the signature is widely used as a means of personal verification
emphasizes the need for an automatic verification system. Verification can be
performed either Offline or Online based on the application. Offline systems work on
the scanned image of a signature. In this paper an Offline Verification of handwritten
signatures which use set of simple shape based geometric features. The features used
are Mean, Occupancy Ratio, Normalized Area, Center of Gravity, Pixel density,
Standard Deviation and the Density Ratio. Before extracting the features,
preprocessing of a scanned image is necessary to isolate the signature part and to
remove any spurious noise present. Features Extracted for whole signature

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Jul 17 2019
Journal Name
Aip Conference Proceedings
The interpolation effect on the spare sinogram for 3D image reconstruction

The effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.

Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Luminance pyramid for image generation and colorization

Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o

... Show More
Scopus (2)
Scopus
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Numerical Treatment of First Order Volterra Integro-Differential Equation Using Non-Polynomial Spline Functions

The approach given in this paper leads to numerical methods to find the approximate solution of volterra integro –diff. equ.1st kind. First, we reduce it from integro VIDEs to integral VIEs of the 2nd kind by using the reducing theory, then we use two types of Non-polynomial spline function (linear, and quadratic). Finally, programs for each method are written in MATLAB language and a comparison between these two types of Non-polynomial spline function is made depending on the least square errors and running time. Some test examples and the exact solution are also given.

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A New Approach of Morgan-Voyce Polynomial to Solve Three Point Boundary Value Problems

In this paper, a new procedure is introduced to estimate the solution for the three-point boundary value problem which is instituted on the use of Morgan-Voyce polynomial. In the beginning, Morgan-Voyce polynomial along with their important properties is introduced. Next, this polynomial with aid of the collocation method utilized to modify the differential equation with boundary conditions to the algebraic system. Finally, the examples approve the validity and accuracy of the proposed method.

Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Thu Oct 02 2014
Journal Name
Journal Of The Islamic University College
The image of the family in dubbed Turkish series and their potential impact on Iraqi youth

Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th

... Show More