Preferred Language
Articles
/
JRZVvosBVTCNdQwC7dpf
Assessment of organic carbon content in different topographic from northern Iraq using remote sensing technique and GIS
...Show More Authors

Scopus
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Experimental Study For a Laminar Natural Convection Heat Transfer From an Isothermal Heated Square Plate With and Without Circular Hole
...Show More Authors

An experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 24 2020
Journal Name
International Journal Of Pharmaceutical Research
Preparation, spectral characterization and biological activity of somenewbimetalic complexes derived from{ 2,2`((5-methyl-1,3-phenylene)-bis- (oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}ligand
...Show More Authors

In this work, the preparation of new multidentate Schiff-base lig and and its metal complexes are described. The formation of the lig and{ 2,2`((5-methyl-1,3-phenylene)-bis-(oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}[H2L] was prepared from the reaction {2,2-((5-methyl-1,3-phenylene)-bis-(oxy))- di-(acetohydrazide)}[M]precursor and salicylaldehyde in a 1:2 mole ratio, respectively. The reaction of the lig and [H2L] with (Cr+3 , Mn+2 and Fe+2 )metal ions in a 1:2 (L:M) mole ratio. Ligand and complexes were characterised via spectroscopic analyses; [FT-IR, UV-Vis spectroscopy,(C.H.N) microanalysis, chloride content, thermal analysis(TG), electrospray mass, magnetic susceptibility and conductivity measurements. The characterisation d

... Show More
View Publication
Publication Date
Mon Oct 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
&lt;b&gt;Commercial Graphite Flakes as an Adsorbent of Janus Green Dye from Aqueous Solution: Adsorption Kinetics and Isotherms Study&lt;/b&gt;
...Show More Authors

Commercial graphite (CGT) powder was used as an adsorbent surface for cationic dye, Janus green (JG), from aqueous solutions. This study aims to highlight the practical significance of using inexpensive CGT as an efficient adsorbent for the removal of JG dye from industrial wastewater. CGT was characterized by Fourier transform infrared spectroscopy, scanning electron microscopy, and X-ray diffraction. The adsorption process was investigated by examining parameters like the weight of the adsorbent, contact time, and temperature. Pseudo-second-order kinetic (PSO), pseudo-first-order, and intraparticle diffusion were used for analyzing the kinetic data. JG dye's adsorption kinetics fit the PSO kinetic model well (R2= 0.999). Furthermo

... Show More
View Publication
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Al-nahrain Journal For Engineering Sciences
Performance Analysis of FSO under Turbulent Channel Using OSTBC
...Show More Authors

Free Space Optics (FSO) plays a vital role in modern wireless communications due to its advantages over fiber optics and RF techniques where a transmission of huge bandwidth and access to remote places become possible. The specific aim of this research is to analyze the Bit-Error Rate (BER) for FSO communication system when the signal is sent the over medium of turbulence channel, where the fading channel is described by the Gamma-Gamma model. The signal quality is improved by using Optical Space-Time Block- Code (OSTBC) and then the BER will be reduced. Optical 2×2 Alamouti scheme required 14 dB bit energy to noise ratio (Eb/N0) at 10-5 bit error rate (BER) which gives 3.5 dB gain as compared to no diversity scheme. Th

... Show More
View Publication
Crossref