Preferred Language
Articles
/
6xcWoJIBVTCNdQwC8bpl
La faculté articulatoire de l'apprenant irakien Dans une classe de français langue étrangère A l’université de Bagdad Etude comparative
...Show More Authors

Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Numerical Investigation of Drag Reduction Techniques in a Car Model
...Show More Authors
Abstract<p>Reducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×10<sup>5</sup>, 5.23×10<sup>5</sup>, 7.85×10<sup>5</sup> and 10.46×10<sup>5</sup>), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solvi</p> ... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Egyptian Journal Of Aquatic Biology And Fisheries
Environmental factors drive phytoplankton primary productivity in a shallow Lake
...Show More Authors

View Publication
Scopus (6)
Scopus Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Two-Component Generalization of a Generalized the Short Pulse Equation
...Show More Authors

     In this article, we introduce a two-component generalization for a new generalization type of the short pulse equation was recently found by Hone and his collaborators. The coupled of nonlinear equations is analyzed from the viewpoint of Lie’s method of a continuous group of point transformations. Our results show the symmetries that the system of nonlinear equations can admit, as well as the admitting of the three-dimensional Lie algebra. Moreover, the Lie brackets for the independent vectors field are presented. Similarity reduction for the system is also discussed.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Cleaner Production
A study of biogas production from date palm fruit wastes
...Show More Authors

View Publication
Scopus (40)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
A reliable numerical simulation technique for solving COVID-19 model
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
The Peristaltic Flow of Jeffrey Fluid through a Flexible Channel
...Show More Authors

    The purpose of this study is to calculate the effect of the elastic wall of a hollow channel of Jeffrey's fluid by peristaltic flow through two concentric cylinders. The inside tube is cylindrical and the outside is a regular elastic wall in the shape of a sine wave. Using the cylindrical coordinates and assuming a very short wavelength relative to the width of the channel to its length and using governing equations for Jeffrey’s fluid in Navier-Stokes equations, the results of the problem are obtained. Through the Mathematica  program these results are  analysed.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
A Random Laser Production Using Fluorescein Dye Doped TiO2 Nanoparticles
...Show More Authors

A random laser has been produced using Fluorescein dye solution in water, with concentration of (8 10-5 M); doped with (0.001g) TiO2 Nanoparticles with the particle size of (15.7 nm). A blue diode laser of 450 nm wavelength has been used as an optical pumping source. The wavelength of the random laser was 523 nm and the intensity was 5.44 mW

View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref