Preferred Language
Articles
/
9hjNRZQBVTCNdQwCUQN5
A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Return Variation on Investment as a Function for the Difference of Market Share: An Applied Research on a Sample of Private Banks listed in Iraq Stock Exchange (ISX)
...Show More Authors

    The research specified with study the relation  between the market share for the sample research banks and the amount of the achieved revenues from the investment, where the  dominated belief  that there potentiality enhancing the revenue on investment with the increase of the banks shares in their markets after their success in achieving rates of successive growth in their sales of sales and to a suitable achieve  market coverage for their products and they have dissemination and suitable  promotion activity, the  market share represented the competition  for the banks, and the markets pay attention to the  market share as a strategic objective and to maintain them also increasi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The Prevalence of Hepatitis B Virus in High Risk Groups in Nineveh Governorate / Iraq
...Show More Authors

Hepatitis B is an inflammation of the liver that caused by Hepatitis B virus (HBV) which is DNA virus that infects the human and some kinds of animals such as chimpanzees and birds. This disease considered as the major disease of mankind and a serious global public health problem. HBsAg, HBeAg, HBcAb, HBeAb and HBsAb are markers used to detect the presence and the stage of infection. The current study included (181) individuals from both sexes, (137) males and (44) females. By ratio 3.11: 1.The mean age of patients 2.4033 ± 0.83519 (range 18-73) years as follows < 20 (11.6%), 21–40 (47.5%), 41–60 (29.8%) and > 60 (11.0%) . These patients are 73 (40.4%) Blood donors from Central Blood Bank, 88 (48.6%) Chronic kidney failure at Ibn –

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The exact location and its relation to cognitive method (risk-caution) of University students
...Show More Authors

The present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Assessment of Pro Hepcidin and Related with Iron Profile on Hemodialysis Men Patients
...Show More Authors

Patients with renal failure in the final stages undergo the treatment by hemodialysis. Hemodialysis is used to reinstate the intracellular and extracellular fluid environment, by propagation of molecules in solution through a semipermeable membrane along an electrochemical concentration gradient. Blood catching in the dialysis machine and the recurrent phlebotomy may lead to losing about 1-3 g of iron per year. Prohepcidin hormone is an acute phase protein (type II) that plays a major role in the systemic iron irregularities as it is a mediator of anemia in inflammation and regulator of iron metabolism. This study aims to evaluate the effect of hemodialysis on iron hemostasis and its relationship with prohepcidin as an inflammatory mark

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (12)
Scopus Crossref