Preferred Language
Articles
/
UhZtEokBVTCNdQwCmoXa
Content-based Image Retrieval (CBIR) using Hybrid Technique
...Show More Authors

Image retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is concluded that, for the database images used in this work, the CBIR using hybrid technique is better for image retrieval because it has a higher match performance (100%) for each type of similarity measure so; it is the best one for image retrieval.

View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
The effect of additive carbon nano tube on optical properties of epoxy resin
...Show More Authors

In this work, MWCNT in the epoxy can be prepared at room temperature and thickness (1mm) at different concentration of CNTs powder. Optical properties of multi-walled carbon nanotubes (CNTs) reinforced epoxy have been measured in the range of (300-800)nm. The electronic transition in pure epoxy and CNT/epoxy indicated direct allowed transition. Also, it is found that the energy gap of epoxy is 4.1eV and this value decreased within range of (4.1-3.5)eV when the concentration of CNT powder increased from (0.001-0.1)% respectively.
The optical constants which include (the refractive index (n), the extinction coefficient (k), real (ε1) and imaginarily (ε2) part of dielectric constant calculated in the of (300-800)nm at different concent

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Study of the Singlet and the Triplet States of Two ElectronSystems in the First Excited State
...Show More Authors

A study of the singlet and triplet states of two electron systems in the first excited state was performed using a simple quantum mechanical model, which assigns the 1s,and 2s orbital with two different variational parameters. Our results agree with a high level calculation used by Snow and Bills.

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Spectrophotometric Analysis of Vancomycin Hydrochloride in Pure and Pharmaceutical Injections via Batch and Cloud Point Extraction Techniques
...Show More Authors

Development of a precise and delicate reaction has been acquired for the determination of vancomycin hydrochloride using batch and cloud point extraction (CPE) methods. The first method is based on the formation of azo dye as a result of diazotized dapsone coupled with vancomycin HCl (VAN) in a basic medium. The sensitivity of this reaction was enhanced by utilizing a nonionic surfactant (Triton X-114) and the cloud point extraction technique (second method). The azo dye formed was extracted into the surfactant-rich phase, dissolved in ethanol and detected at λmax 440 nm spectrophotometrically. The reaction was investigated using both batch and CPE methods (with and without extraction), and a simple comparison between the two

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Desulfurization of Diesel Fuel by Oxidation and Solvent Extraction
...Show More Authors

This research presents a study in ultra-desulfurization of diesel fuel produced from conventional hydro desulfurization process, using oxidation and solvent extraction techniques. Dibenzothiophene (DBT) was the organosulfur compound that had been detected in sulfur removal. The oxidation process used hydrogen peroxide as an oxidant and acetic acid as homogeneous catalyst . The solvent extraction process used acetonitrile (ACN) and N-methyl – 2 - pyrrolidone (NMP) as  extractants . Also the effect of five parameters (stirring speed :150 , 250 , 350 , and 450) rpm, temperature (30 , 40 , 45 , and 50) oC, oxidant/simulated diesel fuel ratio (0.5 , 0.75 , 1 , and 1.5) , catalyst/oxidant ratio(0.125,0.25,0.5

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2026
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Effect of Web Stiffeners on The Flexural Behavior of Composite GFRP- Concrete ‎Beam Under Impact Load
...Show More Authors

In this paper, numerical and experimental studies on the elastic behavior of glass fiber reinforced ‎polymer (GFRP) with stiffeners in the GFRP section's web (to prevent local buckling) are presented. ‎The GFRP profiles‎ were connected to the concrete deck slab by shear connectors. Two full-scale simply supported ‎composite beams (with and without stiffeners) were tested under impact load (three-point load) to ‎assess its structural response. The results ‎proved that the maximum impact force, maximum ‎deflection, damping time, and ‎damping ratio of the composite beam were affected by the GFRP ‎stiffeners‎. The experimental results indicated that the damping ratio and deflection were diminished compare

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
The Effects of Long-Term Operation and High Temperature on Material Properties of Austenitic Stainless Steel Type 321H
...Show More Authors

Changes in mechanical properties of material as a result of service in different conditions can be provided by mechanical testing to assist the estimation of current internal situation of these materials, or the degree of deterioration may exist in furnaces serviced at high temperature and exceed their design life. Because of the rarity works on austenitic stainless steel material type AISI 321H, in this work, ultimate tensile strength, yield strength, elongation, hardness, and absorbed energy by impact are evaluated based on experimental data obtained from mechanical testing. Samples of tubes are extracted from furnace belong to hydrotreaterunit, also samples from un-used tube material are used to make comparisons between these properti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of The Chemical Composition and Physical properties of Aged Asphalt Cement
...Show More Authors

In the present work a modification was made on three equations to represent the
experiment data which results for Iraqi petroleum and natural asphalt. The equations
have been developed for estimating the chemical composition and physical properties
of asphalt cement at different temperature and aging time. The standard deviations of
all equations were calculated.
The modified correlation related to the aging time and temperature with penetration
index and durability index of aged petroleum and natural asphalts were developed.
The first equation represents the relationship between the durability index with aging
time and temperature.

loge(DI)=a1+0.0123(2loge T

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref