Preferred Language
Articles
/
ijs-6145
Auto Crop and Recognition for Document Detection Based on its Contents
...Show More Authors

An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
Parameters Estimation for Modified Weibull Distribution Based on Type One Censored Samplest
...Show More Authors

The three parameters distribution called modified weibull distribution (MWD) was introduced first by Sarhan and Zaindin (2009)[1]. In theis paper, we deal with interval estimation to estimate the parameters of modified weibull distribution based on singly type one censored data, using Maximum likelihood method and fisher information to obtain the estimates of the parameters for modified weibull distribution, after that applying this technique to asset of real data which taken for Leukemia disease in the hospital of central child teaching .

View Publication Preview PDF
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Inverse Kinematics Optimization for Humanoid Robotic Legs Based on Particle Swarm Optimization
...Show More Authors

Calculating the Inverse Kinematic (IK) equations is a complex problem due to the nonlinearity of these equations. Choosing the end effector orientation affects the reach of the target location. The Forward Kinematics (FK) of Humanoid Robotic Legs (HRL) is determined by using DenavitHartenberg (DH) method. The HRL has two legs with five Degrees of Freedom (DoF) each. The paper proposes using a Particle Swarm Optimization (PSO) algorithm to optimize the best orientation angle of the end effector of HRL. The selected orientation angle is used to solve the IK equations to reach the target location with minimum error. The performance of the proposed method is measured by six scenarios with different simulated positions of the legs. The proposed

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Apr 15 2020
Journal Name
Al-mustansiriyah Journal Of Science
Adaptation Proposed Methods for Handling Imbalanced Datasets based on Over-Sampling Technique
...Show More Authors

Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE),  Border

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Responding Wheat and Weeds for Seeding Rates and Herbicide as Well Its Effect on Yield and Yield Components
...Show More Authors
Abstract<p>A field experiment was carried out during the seasons 2016 and 2017 in the farm of the Department of Field Crops Science, College of Agricultural Engineering Sciences-University of Baghdad to evaluate the effect of(Aminopyralid + Flurasulam, Coldinafop-propargyl and Flucarbazone-sodium) herbicides and seeding rate (100, 125 and 150) Kg.ha<sup>-1</sup> and the interaction between them in growth characteristics, grain and yield components in wheat (Var. IPA99). The results showed that herbicides used were significantly efficient in studied characteristics compared to weedy treatment. Herbicide Flucarbazone-sodium gave higher weed control after 60 and 90 days of spraying the he</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Hybrid Fuzzy Logic and Artificial Bee Colony Algorithm for Intrusion Detection and Classification
...Show More Authors

In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Science And Research (ijsr)
Color-based for tree yield fruits image counting
...Show More Authors

Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit

... Show More
View Publication
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
EEG Signals Analysis for Epileptic Seizure Detection Using DWT Method with SVM and KNN Classifiers
...Show More Authors

Epilepsy is a critical neurological disorder with critical influences on the way of living of its victims and prominent features such as persistent convulsion periods followed by unconsciousness. Electroencephalogram (EEG) is one of the commonly used devices for seizure recognition and epilepsy detection. Recognition of convulsions using EEG waves takes a relatively long time because it is conducted physically by epileptologists. The EEG signals are analyzed and categorized, after being captured, into two types, which are normal or abnormal (indicating an epileptic seizure).  This study relies on EEG signals which are provided by Arrhythmia Database. Thus, this work is a step beyond the traditional database mission of delivering use

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Gas Sensor for Hazardous Nitrogen Dioxide Based on TiO2 Nanotube Synthesis via Electrochemical Method
...Show More Authors

Because of the quick growth of electrical instruments used in noxious gas detection, the importance of gas sensors has increased. X-ray diffraction (XRD) can be used to examine the crystal phase structure of sensing materials, which affects the properties of gas sensing. This contributes to the study of the effect of electrochemical synthesis of titanium dioxide (TiO2) materials with various crystal phase shapes, such as rutile TiO2 (R-TiO2NTs) and anatase TiO2 (A-TiO2NTs). In this work, we have studied the effect of voltage on preparing TiO2 nanotube arrays via the anodization technique for gas sensor applications. The results acquired from XRD, energy dispersion spectro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Tolerance and its impact on building society
...Show More Authors

Tolerance and its impact on building society

View Publication Preview PDF