Preferred Language
Articles
/
bsj-6322
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed system's performance. method, the classification accuracy has been compared using different types of classifiers. These classifiers are Naïve Bayesian, KNN, J48, and SVM. The range of the identification accuracy for all the processed databases using the proposed scenario is between (%93.8- %97.8). The system was executed using MATHLAB R2017, 2.10 GHz processor, and 4 GB RAM.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Using modified earned value for cost control in construction projects
...Show More Authors

Scopus (18)
Scopus
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Ant Colony Optimization Algorithm for Design of Distribution System with Practical Application
...Show More Authors

The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods. 

The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Integrated in the industrial design system: نوال محسن علي، مصطفى محمد بركات
...Show More Authors

Although the majority of trends confirm the design aspects of the performance, functional and aesthetic design of the product. However, the attention was more focused on the nature of the plastic for those results, it is through the appearance of formal and guaranteed career such as designing Achieved adopt us the extent of the impact Relations Association between the elements and principles of design to achieve complementarity in the completed design of aesthetic and functional significance expressive and symbolic and in doing so has introduced a lot of new concepts for the arrangement and organization, coordination and functional classification of the unfinished design gave way to show diversity trends in the design of industrial produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Design Consolidate Cost Accounting System For Economic Entities
...Show More Authors

      The Costing Accounting is one the analytic tools which plays important role by support the management in planning&  control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.

     The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.   

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Internal Contrl in Electronic Accounting Information System: Applied Study in Spacimen from Kurdistan Regin Iraq
...Show More Authors

Internal control is system,defined and implemented under its responsibility , which aims to ensure that; laws and regulations are complied with; the instructions and directional guidelines fixed by Executive Management or the Management Borad are applied; the company internal processes are functioning correctlly , particularly those implicating the security of its assets; Financial Information is reliable; and generally contributes to the control over its activities , to the efficiency of its operation and to the efficient utilisation of its Resources. By helping to anticipate and control the risks involved in not meeting the objectives the company has set for itself, the internal control system plays akey role in conducting & monito

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Designing a Proposed Educational Program Based on Augmented Reality Technology and Measuring Its Effectiveness in Developing the Skills of Research and Historical Imagination Among Students of the Humanities Track in The Secondary Stage in the City of Mak
...Show More Authors

The current study aims to develop a proposed educational program based on augmented reality (AR) technology, in addition to assessing its effectiveness in developing research and historical imagination skills of the Humanities Track's female students at the secondary stage, as well as assessing the correlative and predictive relationships between the amount of growth for the two dependent variables. To achieve this, a secondary school in the city of Makkah Al-Mukarramah was chosen, and an available random sample of (30) female students from the study population was selected. The quasi-experimental approach was followed by this study, particularly one group design. In addition, two tools were used to collect study data, namely: a test of

... Show More
View Publication Preview PDF