Preferred Language
Articles
/
dhds7pEBVTCNdQwCh5zh
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.

Scopus Clarivate Crossref
Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oxidation of Toluene to Benzoic Acid Catalyzed by Modified Vanadium Oxide
...Show More Authors

A variety of oxides were examined as additives to a V2O5/Al2O3 catalyst in order to enhance the catalytic performance for the vapor phase oxidation of toluene to benzoic acid. It was found that the modification with MoO3 greatly promoted the little reaction leading to improve catalyst performance in terms of toluene conversion and benzoic acid selectivity. The effect of catalyst surface area, catalyst promoters, reaction temperature, O2/toluene, steam/toluene, space velocity, and catalyst composition to catalyst performance were examined in order to increase the benzoic acid selectivity and yield.

View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Numerical and Experimental Analysis of Aircraft Wing Subjected to Fatigue Loading
...Show More Authors

This study deals with the aircraft wing analysis (numerical and experimental) which subjected to fatigue loading in order to analyze the aircraft wing numerically by using ANSYS 15.0 software and experimentally by using loading programs which effect on fatigue test specimens at laboratory to estimate life of used metal (aluminum alloy 7075-T651) the wing metal and compare between numerical and experimental work, as well as to formulate an experimental mathematical model which may find safe estimate for metals and most common alloys that are used to build aircraft wing at certain conditions. In experimental work, a (34) specimen of (aluminum alloy 7075-T651) were tested using alternating bending fatigue machine rig. The t

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Opcion
The effectiveness of using material flow cost accounting to eliminate losses
...Show More Authors

This investigation aimed to explain the mechanism of MFCA by applying this method on air-cooled engine factory which was suffering from high production cost. The results of this study revealed that MFCA is a useful tool to identify losses and inefficiencies of the production process. It is found that the factory is suffering from high losses due to material energy and system losses. In conclusion, it is calculated that system losses are the highest among all the losses due to inefficient use of available production capacity.

Scopus
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Serum Biomarkers are Promising Tools to Predict Traumatic Brain Injury Outcome
...Show More Authors

Traumatic Brain Injury (TBI) is still considered a worldwide leading cause of mortality and morbidity. Within the last decades, different modalities were used to assess severity and outcome including Glasgow Coma Scale (GCS), imaging modalities, and even genetic polymorphism, however, determining the prognosis of TBI victims is still challenging requiring the emerging of more accurate and more applicable tools to surrogate other old modalities

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Prevalence of Some Parasitic Infections in Iraq from 2019 to 2020
...Show More Authors

      Parasitic infections are associated with low education, wars and migration, absence of animal control and poor sanitation. Infections like visceral and cutaneous leishmaniasis (VL and CL), trichomoniasis, toxoplasmosis, malaria, echinococcosis and schistosomiasis are all spread worldwide and have harmful effects on individuals and societies. The aim of this survey was to identify the possible association of these infections with spatial distribution (province/governorate) and patient demographics (age and gender). According to the data collected from the Iraqi National CDC from 2019 to 2020, the predominant parasitic infections in both years were trichomoniasis and CL, followed by echinococcosis, VL and toxoplasmosis. Iraq is

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Bi-Distance Approach to Determine the Topological Invariants of Silicon Carbide
...Show More Authors

          The use of silicon carbide is increasing significantly in the fields of research and technology. Topological indices enable data gathering on algebraic graphs and provide a mathematical framework for analyzing the chemical structural characteristics. In this paper, well-known degree-based topological indices are used to analyze the chemical structures of silicon carbides. To evaluate the features of various chemical or non-chemical networks, a variety of topological indices are defined. In this paper, a new concept related to the degree of the graph called "bi-distance" is introduced, which is used to calculate all the additive as well as multiplicative degree-based indices for the isomer of silicon carbide, Si2

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Haematological Parameters Alternations Resulted by Exposing Albino Mice to Shisha Smoke
...Show More Authors

In this study, effects of shisha smoking on some blood components were evaluated in (120) male adult mice. The animals were divided into four groups according to smoke types (cigarette, shisha, cigarette +shisha) in addition to control groups which exposed to fresh air only. A special inhalation chamber designed locally has been used to expose the animals. Exposed to cigarette smoke was done for 5 min/day while exposed to shisha smoke for 15 min /day /7days/weeks for 4,8,12 weeks. Blood samples were collected to evaluate some hematological variables. The results showed that RBC, WBC count, Hb, PCV, differential leukocyte (Lymphocyte, Monocyte, Neutrphils) were significantly high (P≤0.001) in groups which exposed to shisha smoke as comp

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Shyness in Female College Students And its relation to some Variables
...Show More Authors

The human being is a social being and human communication is a fundamental axis in the process of social interaction, and the characteristic of social shyness grows through the interaction of the individual with his environment. Identifying the level of shyness among university students, and identifying the differences in shyness among university students according to specialization (scientific, humanities). In order to achieve the objectives of the research, the researcher prepared a measure of shyness based on Zimbardo's theory, and the components that he identified are the (behavioral, cognitive, and emotional components). The validity and reliability were calculated using the Cronbach's alpha method, reaching (0.94), and the scale in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Gender Identity Disorder and Its Relationship to Family Upbringing of Adolescents
...Show More Authors

Abstract

The current research aims to identify the role of family upbringing methods in shaping adolescent gender identity disorder, to identify the causes, components, and disorders of the gender identity of adolescents, and to develop practical visions and suggestions to reduce and stop gender identity disorder completely. Due to the sensitivity of the topic, a questionnaire of five open-ended questions was posted on Facebook to collect the needed data, where (20) respondents answered these questions. The researcher took these (20) respondents as the study sample. The results revealed that excessive emancipation within the family, failure to employ family protection laws, and failure to monitor and follow up on

... Show More
View Publication Preview PDF