Preferred Language
Articles
/
VBf2Q48BVTCNdQwC1mjm
Human Gait Identification System Based on Average Silhouette
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Utilization of Dynamical System on Enfolding Semi-group
...Show More Authors

      In this paper, we use  the definition of the action on the set of semi-group of the structure of this research .We introduce the concepts of  -system which is a triple , ,  such that  is a Hausdorff compact space called  phase space,  is a semi-group of transformations with a continuous action  of   on  . We study and proof some theoretical properties related with that system. We also introduce the concept of Enfolding semi-group ( , ,and we prove that it is a compact right topological semi-group. In addition, we study the left and right ideals in the Enfolding semi-group. By using the dynamical system, we reflect various properties concerning with its structure for the Enfolding semi-group. Furthermore, we describe

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
On The Queuing System M/Er/1/N
...Show More Authors

In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Analysis the average lattice strain in the crystal direction (hkl) in MgO nanoparticles by using modified Williamson-Hall method
...Show More Authors

In this work ,the modified williamos-Hall method was used to analysis the x-ray diffraction lines for powder of magnesium oxide nanoparticles (Mgo) .and for diffraction lines (111),(200),(220),(311) and (222).where by used special programs such as origin pro Lab and Get Data Graph ,to calculate the Full width at half maximum (FWHM) and integral breadth (B) to calculate the area under the curve for each of the lines of diffraction .After that , by using modified Williamson –Hall equations to determin the values of crystallite size (D),lattice strain (ε),stress( σ ) and energy (U) , where was the results are , D=17.639 nm ,ε =0.002205 , σ=0.517 and U=0.000678 respectively. And then using the scherrer method can by calculated the crystal

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
FACE IDENTIFICATION USING BACK-PROPAGATION ADAPTIVE MULTIWAVENET
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Face Identification Using Back-Propagation Adaptive Multiwavenet
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 20 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Genders identification using mandibular canines(Iraqi study)
...Show More Authors

Background: This study aimed to determine the gender of a sample of Iraqi adults using the mesio-distal width of mandibular canines, inter-canine width and standard mandibular canine index, and to determine the percentage of dimorphism as an aid in forensic dentistry. Materials and methods: The sample included 200 sets of study models belong to 200 subjects (100 males and 100 females) with an age ranged between 17-23 years. The mesio-distal crown dimension was measured manually, from the contact points for the mandibular canines (both sides), in addition to the inter-canine width using digital vernier. Descriptive statistics were obtained for the measurements for both genders; paired sample t-test was used to evaluate the side difference of

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
Un Published
Search Engine for Identification of Personal Images
...Show More Authors

Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Journal Of Pure And Applied Microbiology
Microbiological Identification of Bacteria with Leukemic Children
...Show More Authors

The most common form of childhood cancer is leukemia, Calculation for more than one third of all childhood cancers among those ages 1 day – 14 years. The diseases of leukemia are worldwide, it occurred in both genders from male and females and in all age. A total of 80 different samples of patient children were collected from the central teaching hospital of pediatric in Baghdad. Obtained during the period from 1st Sept. 2019 till the 31 th of Aug. 2020. Each isolates identification by using Vitek 2. Isolated organism in leukemic children show 18 (22.5 %) gram positive and 62 (77.5 %) gram negative from the total sample 80 (100.0 %). The percent of male is 45 more than female which represents 35 in most age groups between age (1 d

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More