Preferred Language
Articles
/
ijs-3143
Simultaneous Approximation by a New Sequence of Integral Type Based on Two Parameters
...Show More Authors

This paper introduces a generalization sequence of positive and linear operators of integral type based on two parameters to improve the order of approximation. First, the simultaneous approximation is studied and a Voronovskaja-type asymptotic formula is introduced. Next, an error of the estimation in the simultaneous approximation is found. Finally, a numerical example to approximate a test function and its first derivative of this function is given for some values of the parameters. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Aci Structural Journal
Stress at Ultimate in Internally Unbonded Steel Based on Genetic Expression Programming
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 23 2021
Journal Name
Iraqi Journal Of Physics
Thin Film Dye Laser Based on BBQ Doped Poly (Methyl Meth-Acrylate)
...Show More Authors

This paper reports on the laser emission properties of the BBQ dye in poly (methyl meth-acrylate)(PMMA). This host material combines the advantages of an organic environment for dye with the thermoptical mechanical properties of an organic dye. A BBQ dye solid solution in PMMA polymer. A nitrogen laser in untuned laser cavity has pumped thin films. We developed the concentration and the thickness to get high efficiency. The laser efficiency had been increased from 7% at thickness 1.5 m to 16.5% at thickness 3.5m, and from 1% to 10% when concentration increased from 1x10-5M to 1x10-3 M

View Publication Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Watershed Transform Based on Clustering Techniques to Extract Brain Tumors in MRI
...Show More Authors

In this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 17 2019
Journal Name
Iraqi Journal Of Science
Fabrication and Enhancement UV Photodiode Based on Mg-Doped ZnO Nanorods Films
...Show More Authors

Magnesium-doped Zinc oxide (ZnO: Mg) nanorods (NRs) films and pure Zinc oxide deposited on the p-silicon substrates were prepared by hydrothermal method. The doping level of the Mg concentration (atoms ratio of Mg to Zn was chosen to be 0.75% and 1.5%. X-ray diffraction (XRD) and energy-dispersive X-ray spectroscopy (EDX) were performed to characterize the prepared films. X-ray diffraction analysis showed a decrease in the lattice parameters of the Mg-doped ZnO NRs. Under 10V applied bias voltage, the responsivity of p-n junction UV photodiode based on pure ZnO and Mg: ZnO with doping ratio (0.75% and 1.5%) was 0.06 A/W and (0.15A/W and 0.27A/W) at UV illumination of wavelength 365 nm respectively, 0.071 A/W and (0.084A/W and 0.11A/W) fo

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Hybrid Algorithm for Generate Database Index Key Based on Image Contents
...Show More Authors

  This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys)  of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev

... Show More
View Publication Preview PDF