Preferred Language
Articles
/
alkej-418
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred between the proposed and original part so as to demonstrate the verification of the proposed method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Aug 19 2020
Journal Name
Revista De Chimie
Synthesis, Characterization and Biological Evaluation of Cr(III), Fe(III), Co(II), Ni(II), Zn(II) and Cd(II) Complexes Using an Azo Dye as Ligand
...Show More Authors

Azo ligand 11-(4-methoxyphenyl azo)-6-oxo-5,6-dihydro-benzo[4,5] imidazo[1,2-c] quinazoline-9-carboixylic acid was derived from 4-methoxyaniline and 6-oxo-5,6-dihydro-benzo[4,5]imidazo[1,2-c]quinazoline-9-carboxylic acid. The presence of azo dye was identified by elemental analysis and spectroscopic methods (FT-IR and UV-Vis). The compounds formed have been identified by using atomic absorption in flame, FT.IR, UV-Vis spectrometry magnetic susceptibility and conductivity. In order to evaluate the antibacterial efficiency of ligand and its complexes used in this study three species of bacteria were also examined. Ligand and its complexes showed good bacterial efficiencies. From the obtained data, an octahedral geometry was proposed for all p

... Show More
Publication Date
Sat Mar 01 2008
Journal Name
The Third International Conference On Mathematical Sciences
On Solvability of an Operator Equation
...Show More Authors

Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Medical Sciences
Lower Gastrointestinal Bleeding: An Etiological Study.
...Show More Authors

Publication Date
Wed May 29 2019
Journal Name
Selected Topics In Facial Nerve Disorders
Introductory Chapter: Facial Nerve - An Overview
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 01 2007
Journal Name
No
On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Wed Aug 01 2007
Journal Name
University Of Baghdad, College Of Education For Pure Science (ibn Al-haitham), Department Of Mathematical
Thesis.On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Debt swaps An Islamic Economic Evaluation
...Show More Authors

Introduction:

        Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref