Preferred Language
Articles
/
ijp-936
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Tue Apr 02 2019
Journal Name
Artificial Intelligence Research
A three-stage learning algorithm for deep multilayer perceptron with effective weight initialisation based on sparse auto-encoder
...Show More Authors

A three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Reconstruction of Three-Dimensional Object from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation
...Show More Authors

Three-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Performance enhancement of Echo Cancellation Using a Combination of Partial Update ( PU) Methods and New Variable Length LMS (NVLLMS) Algorithm
...Show More Authors

In this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 14 2018
Journal Name
International Journal Of Engineering & Technology
Hybrid DWT-DCT compression algorithm & a new flipping block with an adaptive RLE method for high medical image compression ratio
...Show More Authors

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig

... Show More
View Publication
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Process Safety And Environmental Protection
Optimized ensemble deep random vector functional link with nature inspired algorithm and boruta feature selection: Multi-site intelligent model for air quality index forecasting
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
The authority of the president in the successive regimes in Iraq in the time - span 1920-2003
...Show More Authors

Abstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2008
Journal Name
College Of Islamic Sciences
The judiciary in Jerusalem in the Islamic era
...Show More Authors

God created man with a social nature, that is, man cannot live alone, but there must be a society associated with him. And when God addressed Adam, the first of His creation, he addressed him with the speech of the Muthanna to him and his wife. “This tree, then you will be among the wrongdoers” (Al-Baqara: 35), and thus was the divine discourse for the first human experience on earth. It accommodates a social relationship, which is (the family), husband and wife. And since a person needs to meet, as Ibn Khaldun said: (The human meeting is necessary, and the wise men express this by saying (the human being is of course civil)) (). And as it is known that with the meeting, relations arise from love and hate, cooperation and struggle, a

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Alienation in Adolescence in J.D. Salinger's The Catcher in the Rye
...Show More Authors

Alienation is a feeling that inflicts people especially adolescents due to certain reasons. As they grow up, adolescents tend to face certain psychological disturbances. They somehow feel indifferent to their surroundings and hence it would be quite hard for them to express their notions in the reality world they live in. So they either rebel against society and become aggressive members or they might console themselves in an alienated world that they create in their minds.

   This paper depicts J.D. Salinger's (1919-2010) novel The Catcher in the Rye where its protagonist, Holden Caulfield, is an adolescent who feels there is no linkage or connection with the traits of his society. He is a teenager who

... Show More
View Publication Preview PDF