Preferred Language
Articles
/
AhaIZIoBVTCNdQwC_p0w
3-Level Techniques Comparison based Image Recognition
...Show More Authors

Image recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third level. The two techniques that have the best results which are (sww and www) are chosen, then image recognition is applied to these two techniques using Euclidean distance and Manhattan distance and a comparison between them has been implemented., it is concluded that, sww technique is better than www technique in image recognition because it has a higher match performance (100%) for Euclidean distance and Manhattan distance than that in www..

Crossref
View Publication
Publication Date
Mon Aug 27 2018
Journal Name
Oriental Journal Of Chemistry
Synthesis, Characterization and Antibacterial Activity of Carbamate Derivatives of Isatin
...Show More Authors

In search of novel antibacterial agent, a series of new isatin derivatives (3a-d) have been synthesized by condensation isatin (2,3-indolinendione) with piperidine (hexahydropyridine), hydrazine hydrate and Boc-amino acids respectively. Compounds synthesized have been characterized by IR spectroscopy and elemental analysis. In addition, the in vitro antibacterial properties have been tested against E. coli, P. aeruginosa, and Bacillus cereus, S. aureus by employing the well diffusion technique. A majority of the synthesized compounds were showing good antibacterial activity and from comparisons of the compounds, compound 3d has been determined to be the most active compound.

View Publication
Scopus (11)
Crossref (12)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Synthesis, Characterization and Study Electrical Conductivity of New Poly Thiadizole Derivatives, Silica Nanocomposites
...Show More Authors

Heterocyclic polymers / silica nanocomposite one of important materials because of excellent properties such as thermal , electrical , and mechanical properties , so that hybrid nanomaterial are widely used in many fields, in this paper nanocomposite had prepared by modification of silica nanoparticals by using acrylic acid and functionalized the surface of nanoparticles, and using free Radical polymerization by AIBN as initiators and anhydrous toluene as solvent to polymerize functionalize silica nanoparticles with heterocyclic monomers to prepare heterocylic polymers / silica nanocomposite and study electrical conductivity , The nanocomposite which had prepared characterized by many analysis technique to study thermal properties such

... Show More
Scopus
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
The generalized Cayley graph of complete graph K_n and complete multipartite graphs K_(n,n) and K_(n,n,n)
...Show More Authors

Suppose that  is a finite group and  is a non-empty subset of  such that  and . Suppose that  is the Cayley graph whose vertices are all elements of  and two vertices  and  are adjacent if and only if . In this paper, we introduce the generalized Cayley graph denoted by  that  is a graph with vertex set consists of all column matrices  which all components are in  and two vertices  and  are adjacent if and only if , where  is a column matrix that each entry is the inverse of similar entry of  and  is  matrix with all entries in  ,  is the transpose of  and . In this paper, we clarify some basic properties of the new graph and assign the structure of  when  is complete graph , complete bipartite graph  and complete

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Six-coordinate oxime-imine cobalt(III) complexes with amino acid co-ligands; synthesis and characterisation
...Show More Authors

In this publication, several six coordinate Co(III)-complexes are reported. The reaction of 2,3-butanedione monoxime with ethylenediamine or o-phenylenediamine in mole ratios of 2:1 gave the tetradentate imine-oxime ligands diaminoethane-N,N`-bis(2-butylidine-3-onedioxime) H2L1 and o-phenylenediamine-N,N`-bis(2-butylidine-3-onedioxime), respectively. The reaction of H2L1 and H2L2 with Co(NO3)2, and the amino acid co-ligands (glycine or serine) resulted in the formation of the required complexes. Upon complex formation, the ligands behave as a neutral tetradantate species, while the amino acid co-ligand acts as a monobasic species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Remove Reflection Using Wavelet transformation Estimation
...Show More Authors

     Improving the performance of visual computing systems is achieved by removing unwanted reflections from a picture captured in front of a glass. Reflection and transmission layers are superimposed in a linear form at the reflected photographs. Decomposing an image into these layers is often a difficult task. Plentiful classical separation methods are available in the literature which either works on a single image or requires multiple images. The major step in reflection removal is the detection of reflection and background edges. Separation of the background and reflection layers is depended on edge categorization results. In this paper a wavelet transform is used as a prior estimation of background edges to sepa

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Copy Move Forgery Detection Using Forensic Images
...Show More Authors

     Digital images are open to several manipulations and dropped cost of compact  cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image  by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Detection and Discrimination for Shadow of High Resolution Satellite Images by Spatial Filter
...Show More Authors

This paper presents a new and effective procedure to extract shadow regions of high- resolution color images. The method applies this process on modulation the equations of the band space a component of the C1-C2-C3 which represent RGB color, to discrimination the region of shadow, by using the detection equations in two ways, the first by applying Laplace filter, the second by using a Kernel Laplace filter, as well as make comparing the two results for these ways with each other's. The proposed method has been successfully tested on many images Google Earth Ikonos and Quickbird images acquired under different lighting conditions and covering both urban, roads. Experimental results show that this algorithm which is simple and effective t

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Suggested methods for prediction using semiparametric regression function
...Show More Authors

Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN m

... Show More
Preview PDF
Scopus
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref