Preferred Language
Articles
/
ChZUZYoBVTCNdQwCdJ3M
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (Ecl) distance match performance is (62%) in MWM. So, in speech recognition to get the high alignment and high performance one must use DTW distance measurement.

Crossref
View Publication
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Initial Recognition and Prophecy of Diabetic Nephropathy in Type I Diabetes in a Sample of Iraqi Patients
...Show More Authors

Back ground: Diabetic nephropathy is rapidly becoming the leading cause of end-stage renal disease (ESRD). The onset and course of DN can be ameliorated to a very significant degree if intervention institutes at a point very early in the course of the development of this complication.
Objective: The aim of this study was to characterize risk factors associated with nephropathy in type I diabetes and construct a module for early prediction of diabetic nephropathy (DN) by analyzing their risk factors.
Methods: Case control design of 400 patients with type I diabetes mellitus (IDDM), aged 19-45 years. The cases were 200 diabetic patients with overt protein urea while the controls were 200 diabetic patients with no protein urea or micr

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Intelligent EMG Pattern Recognition Control Method for Upper-Limb Multifunctional Prostheses: Advances, Current Challenges, and Future Prospects
...Show More Authors

View Publication
Scopus (151)
Crossref (149)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Real-Time Face Tracking and Recognition System Using Kanade-Lucas-Tomasi and Two-Dimensional Principal Component Analysis
...Show More Authors

View Publication
Scopus (17)
Crossref (9)
Scopus Crossref
Publication Date
Fri Nov 07 2025
Journal Name
Al–bahith Al–a'alami
THE SEMIOTICS OF PROPAGANDA SPEECH IN SOCIAL MEDIA SITES (A Semiotic Study of the News Reports on the Israeli "Makan" Channel)
...Show More Authors

Technological and digital development has allowed the emergence of many methods of producing semantics on social media sites within semiotic and propagandistic frameworks. This is what made the image appear in different molds and shapes, especially as it is the first material for visual perception.
This made the Israeli propaganda discourse use it as an important tool to manage the content of suggestive messages with semiological connotations. By doing so, such tool uses social networking sites as an appropriate environment to achieve those goals, which are related to cases of manipulating emotions and minds. It, moreover, changes convictions, attitudes, trends and behaviors according to what the propaganda planner wants.
Many Isra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
The Role of MRI-US Fusion Techniques in Detection of Clinically Significant Prostate Cancer
...Show More Authors

Prostate cancer is the commonest male cancer and the second leading cause of cancer-related death in men. Over many decades, prostate cancer detection represented a continuous challenge to urologists. Although all urologists and pathologists agree that tissue diagnosis is essential especially before commencing active surgical or radiation treatment, the best way to obtain the biopsy was always the big hurdle. The heterogenicity of the tumor pathology is very well seen in its radiological appearance. Ultrasound has been proven to be of limited sensitivity and specificity in detecting prostate cancer. However, it was the only available targeting technique for years and was used to guide biopsy needle passed transrectally or transperineally

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Monitoring the Vegetation and Water Content of Al-Hammar Marsh Using Remote Sensing Techniques
...Show More Authors

The object of the presented study was to monitor the changes that had happened in the main features (water, vegetation, and soil) of Al-Hammar Marsh region. To fulfill this goal, different satellite images had been used in different times, MSS 1973, TM 1990, ETM+ 2000, 2002, and MODIS 2009, 2010. A new technique of the unsupervised classification called (Color Extracting Technique) was used to classify the satellite images. MATLAP programming used the technique and separated Al-Hammar Marsh from other water features (rivers, irrigated lands, etc.) when calculated the changes in the water content of the study region. ArcGIS 9.3 (arcMAP, arcToolbox) were used to achieve this work and calculate area of each class.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Nurses’ Practices Concerning Isolation Techniques for Adult Leukemic Patients in Baghdad Teaching Hospitals
...Show More Authors

Objective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte

... Show More
View Publication Preview PDF