Preferred Language
Articles
/
BBbXoYoBVTCNdQwCO6L4
Adaptive methods for matching problem
...Show More Authors

In this paper, we deal with the problem of general matching of two images one of them has experienced geometrical transformations, to find the correspondence between two images. We develop the invariant moments for traditional techniques (moments of inertia) with new approach to enhance the performance for these methods. We test various projections directional moments, to extract the difference between Block Distance Moment (BDM) and evaluate their reliability. Three adaptive strategies are shown for projections directional moments, that are raster (vertical and horizontal) projection, Fan-Bean projection and new projection procedure that is the square projection method. Our paper started with the description of a new algorithm that is low cost ("soft calculation"); the new procedure significantly has improved the Statistical Region Description (SRD). The new method BDM is highly accurate 98% even higher than our previous image matching modified method.

Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Multistage and Numerical Discretization Methods for Estimating Parameters in Nonlinear Linear Ordinary Differential Equations Models.
...Show More Authors

Many of the dynamic processes in different sciences are described by models of differential equations. These models explain the change in the behavior of the studied process over time by linking the behavior of the process under study with its derivatives. These models often contain constant and time-varying parameters that vary according to the nature of the process under study in this We will estimate the constant and time-varying parameters in a sequential method in several stages. In the first stage, the state variables and their derivatives are estimated in the method of penalized splines(p- splines) . In the second stage we use pseudo lest square to estimate constant parameters, For the third stage, the rem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 17 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Two Derivative Spectrophotometric Methods for the Simultaneous Determination of 4-AminoAntipyrine in Presence of Its Acidic Products
...Show More Authors

    Simple, economic and sensitive mathematical spectrophotometric methods were developed for the estimation 4-aminoantipyrine in presence of its acidic product. The estimation of binary mixture 4-aminoantipyrine and its acidic product was achieved by first derivative and second derivative spectrophotometric methods by applying zero-crossing at (valley 255.9nm and 234.5nm) for 4-aminoantipyrine and (peak 243.3 nm and 227.3nm) for acidic product. The value of  coefficient of determination  for the liner  graphs were  not less than 0.996 and the recovery percentage were found to be in the range from 96.555 to 102.160. Normal ratio spectrophotometric method 0DD was used 50 mg/l acidic product as a divisor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Dar Amjad For Publishing And Distribution, The Hashemite Kingdom Of Jordan
Statistical methods for calculating the validity and reliability of tests and measures using IBM SPSS Statistics Version24
...Show More Authors

لقد كان حرص المؤلف على إصدار هذا الكتاب نابعا ً من قناعة تامة بأن مجال التقويم والقياس بحاجة إلى كتاب علمي حديث يتناول عرض أدوات الاختبار والقياس والمتمثلة بالصدق والثبات ويتسم بالوضوح في التعبير عن المفاهيم والمصطلحات والأنواع لكل منها ليكون وسيلة مبسطة بأيدي الأساتذة والباحثين وطلبتي الدراسات العليا الماجستير والدكتوراه لإستخراج صدق وثبات الاختبارات والمقاييس بطرق إحصائية متقدمة من خلال إستخدام البرنا

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian methods to estimate sub - population
...Show More Authors

The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.

Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
The Defensive Methods Against Deepfake: Review
...Show More Authors

     Due to the spread of “Deepfake” in our society and the impact of this phenomenon on politicians, celebrities, and the privacy of individuals in particular, as well as, on the other hand, its impact on the electoral process as well as financial fraud, all these reasons prompted us to present a research paper dealing with this phenomenon. This paper presents a comprehensive review of Deepfake, how it is created, and who has produced it. This paper can be used as a reference and information source for the methods used to limit deepfake by detecting forgeries and minimizing its impact on society by preventing it. This paper reviews the results of much research in the field of deepfake, as well as the advantages of each method, a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Methods of Arab TV Programs Production
...Show More Authors

This research investigates the methods of producing Investigative Arabic Television Programs that are able to prove its existence during a short period of time as a form of Television programs on Arab satellite channels growing in number and varied in content. The research aims to present qualitative and quantitative descriptions of the methods used in tackling the topics discussed in the program, and knowing whether they satisfy the conditions and scientific foundations for the research, investigation, analysis, and interpretation. The researcher uses the survey method and uses the tool of content analysis including a set of methodological steps that seek to discover the implied meaning of the research sample represented by the program

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Simplification of new fashion design methods
...Show More Authors

Simplification of new fashion design methods

View Publication Preview PDF