Preferred Language
Articles
/
5BbbYYcBVTCNdQwCokgn
A Survey paper on Lossy Audio Compression Methods
...Show More Authors

During the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Grey Wolf Optimization Algorithm: A Survey
...Show More Authors

     The Gray Wolf Optimizer (GWO) is a population-based meta-heuristic algorithm  that belongs to the family of swarm intelligence algorithms inspired by the social behavior of gray wolves, in particular the social hierarchy and hunting mechanism. Because of its simplicity, flexibility, and few parameters to be tuned, it has been applied to a wide range of optimization problems. And yet it has some disadvantages, such as poor exploration skills, stagnation at local optima, and slow convergence speed. Therefore, different variants of GWO have been proposed and developed to address these disadvantages. In this article, some literature, especially from the last five years, has been reviewed and summarized by well-known publishers. Fir

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Survey of Face Recognition Systems
...Show More Authors

With the quick grow of multimedia contents, from among this content, face recognition has got a lot of significant, specifically in latest little years. The face as object formed of various recognition characteristics for detect; so, it is still the most challenge research domain for researchers in area of image processing and computer vision. In this survey article, tried to solve the most demanding facial features like illuminations, aging, pose variation, partial occlusion and facial expression. Therefore, it indispensable factors in the system of facial recognition when performed on facial pictures. This paper study the most advanced facial detection techniques too, approaches: Hidden Markov Models, Principal Component Analysis (PCA)

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
The Genetic Algorithm: A study survey
...Show More Authors

Genetic Algorithms (GA) is a based population approach. It belongs to a metaheuristic procedure that uses population characteristics to guide the search. It maintains and improves multiple solutions which may produce a high-quality solution to an optimization problem. This study presents a comprehensive survey of the GA. We provide and discuss genetic algorithms for new researchers. We illustrate which components build up the GAs and view the main results on complexity time.

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Crawling and Mining the Dark Web: A Survey on Existing and New Approaches
...Show More Authors

    The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Panic Attacks Over COVID 19 : A Survey Study on An Iraqi University Sample
...Show More Authors

Abstract

The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.

To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions:  physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Electronic Security And Digital Forensics
LSB based audio steganography preserving minimum sample SNR
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aims Energy
The impact of different compression ratios on emissions, and combustion characteristics of a biodiesel engine
...Show More Authors

<p>The current work investigated the combustion efficiency of biodiesel engines under diverse ratios of compression (15.5, 16.5, 17.5, and 18.5) and different biodiesel fuels produced from apricot oil, papaya oil, sunflower oil, and tomato seed oil. The combustion process of the biodiesel fuel inside the engine was simulated utilizing ANSYS Fluent v16 (CFD). On AV1 diesel engines (Kirloskar), numerical simulations were conducted at 1500 rpm. The outcomes of the simulation demonstrated that increasing the compression ratio (CR) led to increased peak temperature and pressures in the combustion chamber, as well as elevated levels of CO<sub>2</sub> and NO mass fractions and decreased CO emission values un

... Show More
View Publication
Scopus Clarivate Crossref