Preferred Language
Articles
/
ijs-1152
A Proposed Approach to Determine the Edges in SAR images
...Show More Authors

Radar is the most eminent device in the prolonged scattering era The mechanisms involve using electromagnetic waves to take Synthetic Aperture Radar (SAR) images for long reaching. The process of setting edges is one of the important processes used in many fields, including radar images, which assists in showing objects such as mobile vehicles, ships, aircraft, and meteorological and terrain forms. In order to accurately identify these objects, their edges must be detected. Many old-style methods are used to isolate the edges but they do not give good results in the  determination process. Conservative methods use an operator to detect the edges, such as the Sobel operator which is used to perform edge detection where the edge does not appear well.

     The proposed method which combines Ridgelet transform, Bezier curve and Sobel operator is used to detect edges very efficiently. Ridghelet transform resolves the harms in the wavelet transform and it can well detect the edges in images. Bezier curve can profit gradual variation of the data and their mutability. Hence, the efficiency of the edged image is improved and, when used with Sobel operator, the quality of the edge image become very good. The data show that the advocated method has superior fallouts over the Sobel edge detection and the wavelet method in both subjective and impartial experiments. While the Peak Signal to Noise Ratio(PSNR) values were equal to 9.3812, 9.8918, 9.6521 and 9.0743using the Sobel operator method and to10.2564, 10.7927, 10.5612and 10.8633 using the wavelet method, they were increased in the proposed method to 12.6542, 12.9514, 12.8574 and 12.3013 respectively.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
A New Approach for Designing Multi Information Management System Using XML Technology
...Show More Authors

 

XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.

    

View Publication Preview PDF
Publication Date
Wed Nov 01 2023
Journal Name
Solar Energy
Optimizing performance of water-cooled photovoltaic-thermal modules: A 3D numerical approach
...Show More Authors

To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Feature Extraction Using Remote Sensing Images
...Show More Authors

Feature extraction provide a quick process for extracting object from remote sensing data (images) saving time to urban planner or GIS user from digitizing hundreds of time by hand. In the present work manual, rule based, and classification methods have been applied. And using an object- based approach to classify imagery. From the result, we obtained that each method is suitable for extraction depending on the properties of the object, for example, manual method is convenient for object, which is clear, and have sufficient area, also choosing scale and merge level have significant effect on the classification process and the accuracy of object extraction. Also from the results the rule-based method is more suitable method for extracting

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 24 2020
Journal Name
Psychology And Education
A Proposed Programme Based On Sensory Integration Theory For Remediating Some Development Learning Disabilities Among Children
...Show More Authors

The current research aims to prepare a proposed Programmebased sensory integration theory for remediating some developmental learning disabilities among children, researchers prepared a Programme based on sensory integration through reviewing studies related to the research topic that can be practicedby some active teaching strategies (cooperative learning, peer learning, Role-playing, and educational stories). The Finalformat consists of(39) training sessions.

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurement

... Show More
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
New Results of Normed Approach Space Via β-Approach Structure
...Show More Authors

      Researchers have identified and defined β- approach normed space if some conditions are  satisfied. In this work, we show that every approach normed space is a normed space.However, the converse is not necessarily true by giving an example. In addition, we define β – normed Banach space, and some examples are given. We also solve some problems. We discuss a finite β-dimensional app-normed space is β-complete and consequent Banach app- space. We explain that every approach normed space is a metric space, but the converse is not true by giving an example. We define β-complete and give some examples and propositions. If we have two normed vector spaces, then we get two properties that are equivalent. We also explain that

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Determine the Most Common Geotechnical Risks and Their Impacts on the Cost and Time Schedule for Implementing Water Treatment Plants in Iraq
...Show More Authors

View Publication
Crossref