Preferred Language
Articles
/
URbp_4kBVTCNdQwCoY9H
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Mass Transfer Coefficient During Cathodic Protection of Low Carbon Steel in Seawater
...Show More Authors

The aim of this research is to calculate mass transfer coefficient, kd, during cathodic protection of low carbon steel in neutral seawater (3.5% W/V NaCl in distilled water with pH = 7). Two types of cathodic protection were used:

First: Sacrificial anode cathodic protection (SACP) were a pipeline of steel carrying seawater  using zinc as a sacrificial anode and with variable temperatures ranged (0 – 45oC) and volumetric flow rate ranged (5 – 900 lit/hr). It was found that the kd increases with increasing temperature and volumetric flow rate of seawater, where kd ranged (0.24×10-6 – 41.6×10-6 m/s).

Second: Impressed current cathodic pr

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Dependence of gamma-ray absorption coefficient on the size of lead particle
...Show More Authors

In this study, dependence of gamma-ray absorption coefficient on the size of Pb particle size ranging from 200µm up to 2.5mm, using different weights of each particle size. The results show that gamma-ray attenuation coefficient is inversely proportional with the size of Pb particle size due to the reduction of the spaces between the lead particles.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DISPERSIVE LIQUID LIQUID MICRO EXTRACTION SPECTROPHOTOMETRIC DETERMINATION OF TELMESARTAN AND IRBESARTAN IN PHARMACEUTICALS SAMPLES: DISPERSIVE LIQUID LIQUID MICRO EXTRACTION SPECTROPHOTOMETRIC DETERMINATION OF TELMESARTAN AND IRBESARTAN IN PHARMACEUTICALS SAMPLES
...Show More Authors

The current work is characterized by simplicity, accuracy and high sensitivity Dispersive liquid - Liquid Micro Extraction (DLLME). The method was developed to determine Telmesartan (TEL) and Irbesartan (IRB) in the standard and pharmaceutical composition. Telmesartan and Irbesartan are separated prior to treatment with Eriochrom black T as a reagent and formation ion pair reaction dye. The analytical results of DLLME method for linearity range (0.2- 6.0) mg /L for both drugs, molar absorptivity were (1.67 × 105-    5.6 × 105) L/ mole. cm, limit of detection were (0.0242and0.0238), Limit of quantification were (0.0821and0.0711), the Distribution coefficient were

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Alpha-Alumina Extraction from Al-Ga'ara Bauxite
...Show More Authors

The bauxite produced from Al-Ga 'ara area in Al-Enbar containing 50.4 wt. percentages Al2O3 was used for a- alumina production.                                                                                                

For α-alumina pro

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Immediate Implant Placement in Fresh Extraction Socket
...Show More Authors

Background: In the traditional protocol, the patient should wait after extraction up to six months to place the dental implant in healed bone, this waiting time accompanied by varying degrees of alveolar bone changes. In order to overcome these problems, immediate implant placement in the fresh extraction socket was introduced. The Aim of this study was to evaluate the outcome of the immediate implant placement utilizing Resonance Frequency Analysis (RFA) to quantify implant stability and osseointegration. Materials and Methods: A total of (23) patients participated in the study, receiving (44) implants placed in the sockets of teeth indicated for extraction. Clinical and radiographic preoperative assessment was accomplished for each patie

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Oct 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
AUTOMATIC ARABIC KEYWORD EXTRACTION USING LOGISTIC REGRESSION
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Sep 21 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Emotion Recognition Based on Mining Sub-Graphs of Facial Components
...Show More Authors

Facial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref