Preferred Language
Articles
/
RBb14osBVTCNdQwCEePb
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. To reduce the number of generated sub-graphs, overlap ratio metric is utilized for this purpose. After encoding the final selected sub-graphs, binary classification is then applied to classify the emotion of the queried input facial image using six levels of classification. Binary cat swarm intelligence is applied within each level of classification to select proper sub-graphs that give the highest accuracy in that level. Different experiments have been conducted using Surrey Audio-Visual Expressed Emotion (SAVEE) database and the final system accuracy was 90.00%. The results show significant accuracy improvements (about 2%) by the proposed system in comparison to current published works in SAVEE database.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
השואה והשלכותיה על אהרון אפלפלד - עיון בשלושה סיפורים קצרים עוזר למורה – עלי מוחמד רשיד The Holocaust and its impact on Aharon Bielefeld - A Study in Three Short Stories
...Show More Authors

מטרת המחקר הזה היא לבדוק את שלושה סיפורים קצרים מהקובץ הראשון של אהרון אפלפלד , שנחשב ההצהרה הרשמית על היותו סופר השואה הראשון בישראל , המשותף לשלושת הסיפורים הוא הנימה של הגיבורים היוצאים למסע פיזי ונפשי לגלות את אשר אירע להם , מגמתו של המחקר היא לבדוק את הצורה המיוחדת שבה אפיין אפלפלד את גיבוריו שמעידים על כך , כי השואה היא החוויה המרה והקשה בקרב היהודים והשלכותיה נשארה טמונה בקרבם גם אחרי המלחמה ואחרי שנים

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 20 2025
Journal Name
Tikrit Journal Of Engineering Sciences
Effect of Different Compressor Speeds on the Energy and Exergy of an Automobile Air-Conditioner Using R134a in the Absence and Presence of a Liquid-Suction Heat Exchanger
...Show More Authors

Refrigerant R134a has been widely utilized in automotive air conditioning systems (AACSs); R134a has a high global warming potential (GWP) of 1430 despite having zero ozone depletion potential (ODP). Coming refrigeration systems must include refrigerants with low GWP and zero ODP. The aim of this experimental study is to evaluate the thermal performance of an (AAC) with different values of compressor speeds, i.e., (1000, 1700, and 2400 rpm) and two thermal loads, i.e., (500 and 1000 Watt) with the absence and presence of liquid suction heat exchanger (LSHX) using R134a. The results showed that adding LSHX enhanced the COP cycle by 7.18%, 10.7%, and 3.09% for the first, second, and third speed, respectively, at 500 Watt, while the en

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Effect of the Aquatic Plant Hydrella vorticellata as a Fertilizer on Seed Germination and some Chemical and Cytogenetics Parameters in the cell of Hordeum vulgare and Vicia faba
...Show More Authors

The present study is concerned with studying the effect of aquatic plant Hydrella vorticellata with the concentration of 10 and 20 gm/2 K gm soil on percentage and growth rate of germinating seeds of Hordeum vulgare and Vicia faba. More overs, the quantitative amount of NPK in both tested plants and Hydrella vorticellata, are estimated as an organic fertilizer. It has also been find the total number of root cells, the number of dividing cells, and stages of mitosis. The study reveales, that there are no significant differences between the concentration of hydrella used in germination percentage, growth rate, wet and dry weight. While there are differences in the plants containing NPK. The number of cells dividing stages and number of divid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of financial derivatives on the risk of foreign currency exchange volatility in enhancing the quality of profits - a method that is prescribed in the Iraqi environment
...Show More Authors

The objective of this research is to develop a method for applying financial derivatives in the local environment to reduce the risk of foreign exchange rate fluctuations to enhance quality of accounting profits through Financial reporting to local units In accordance with international financial reporting standards, To accomplish this objective was selected a sample of Iraqi units exposed to the risk of fluctuations in foreign currency rates, As the research found:

  • many companies and banks in the local environment a lot of losses due to fluctuations in foreign currency exchange rates.
  • that financial derivatives in the Iraqi environment represent

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 15 2025
Journal Name
Journal Of Legal And Political Studies
International and Regional Competition in the Middle East and its Impact on Iraqi National Security, with Special Reference to the Kurdistan Region: A Study of Challenges and Opportunities
...Show More Authors

This competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Nominal Ellipsis in English & Arabic and its Influence on the Translation of the Meanings of Some Selected Qurànic Verses ( A Contrastive study ): هدى فالح حسن & جمانة شكيب محمد
...Show More Authors

Nominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref