Preferred Language
Articles
/
74a5h4YBIXToZYALmYx9
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
International Journal On Technical And Physical Problems Of Engineering
Deep Learning Techniques For Skull Stripping of Brain MR Images
...Show More Authors

Deep Learning Techniques For Skull Stripping of Brain MR Images

Scopus
Publication Date
Thu May 05 2022
Journal Name
5g Impact On Biomedical Engineering
Wireless Techniques and Applications of the Internet of Medical Things
...Show More Authors

View Publication
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Applying Some OF Freinet's Instructional Techniques IN Our Educational Institutes
...Show More Authors

Each educational system aims at having an effective way of

teaching that leads to an effective learing.This needs preparing good inputs in their standard qualifications and good effective ways in the phae of processes during which reliable and valid methods and technjqucs of teaching are used.

Instructional techniques have gained, lately, an increasing and

great attention of educationists because of their many techniques arc Frcinet's  which they can be applied in our cducutional institution (schools, institutes and colleges),after giving a brief profile of Frcint

and  his educa      tiona! ideas and  his innovations in the field of

instructional techniques.<

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Geological Journal
A Review of Historical Studies for Water Saturation Determination Techniques
...Show More Authors

Water saturation is the most significant characteristic for reservoir characterization in order to assess oil reserves; this paper reviewed the concepts and applications of both classic and new approaches to determine water saturation. so, this work guides the reader to realize and distinguish between various strategies to obtain an appropriate water saturation value from electrical logging in both resistivity and dielectric has been studied, and the most well-known models in clean and shaly formation have been demonstrated. The Nuclear Magnetic Resonance in conventional and nonconventional reservoirs has been reviewed and understood as the major feature of this approach to estimate Water Saturation based on T2 distribution. Artific

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Hybrid Color Image Compression of Hard & Soft Mixed Thresholding Techniques
...Show More Authors

Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Application of Data Mining Techniques on Tourist Expenses in Malaysia
...Show More Authors

Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence and Metaverse Techniques to Reduce Earning Management
...Show More Authors

This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d

... Show More
View Publication
Crossref (6)
Scopus Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Numerical Investigation of Drag Reduction Techniques in a Car Model
...Show More Authors
Abstract<p>Reducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×10<sup>5</sup>, 5.23×10<sup>5</sup>, 7.85×10<sup>5</sup> and 10.46×10<sup>5</sup>), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solvi</p> ... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref