Preferred Language
Articles
/
ijs-6944
Design of an Efficient Face Recognition Algorithm based on Hybrid Method of Eigen Faces and Gabor Filter
...Show More Authors

Face recognition is one of the most applications interesting in computer vision and pattern recognition fields. This is for many reasons; the most important of them are the availability and easy access by sensors. Face recognition system can be a sub-system of many applications. In this paper, an efficient face recognition algorithm is proposed based on the accuracy of Gabor filter for feature extraction and computing the Eigen faces. In this work, efficient compressed feature vector approach is proposed. This compression for feature vector gives a good recognition rate reaches to 100% and reduced the complexity of computing Eigen faces. Faces94 data base was used to test method.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Deep Learning-Based Speech Enhancement Algorithm Using Charlier Transform
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 12 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Investigation of Lipid Polymer Hybrid Nanocarriers for Oral Felodipine Delivery: Formulation, Method, In-vitro and Ex-vivo Evaluation
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Chemical Physics Impact
An efficient Ag decorated CeO2 synergetic catalyst for improved catalytic reduction of lethal 4-nitrophenol
...Show More Authors

Catalytic reduction is considered an effective approach for the reduction of toxic organic pollutants from the environment, but finding an active catalyst is still a big challenge. Herein, Ag decorated CeO2 catalyst was synthesized through polyol reduction method and applied for catalytic reduction (conversion) of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP). The Ag decorated CeO2 catalyst displayed an outstanding reduction activity with 99% conversion of 4-NP in 5 min with a 0.61 min−1 reaction rate (k). A number of structural characterization techniques were executed to investigate the influence of Ag on CeO2 and its effect on the catalytic conversion of 4-NP. The outstanding catalytic performances of the Ag-CeO2 catalyst can be assigne

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
BUILD AN EFFICIENT INVESTMENT PORTFOLIO USING THE WILLIAM RATIO (EMPIRICAL STUDY) IN IRAQ STOCK EXCHANGE: BUILD AN EFFICIENT INVESTMENT PORTFOLIO USING THE WILLIAM RATIO (EMPIRICAL STUDY) IN IRAQ STOCK EXCHANGE
...Show More Authors

ABSTRACT

            This study aimed to choose top stocks through technical analysis tools specially the indicator called (ratio of William index), and test the ability of technical analysis tools in building a portfolio of shares efficient in comparison with the market portfolio. These one technical tools were used for building one portfolios in 21 companies on specific preview conditions and choose 10 companies for the period from (March 2015) to (June 2017). Applied results of the research showed that Portfolio yield for companies selected according to the ratio of William index indicator (0.0406) that

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
. International Journal Of Computer Science And Mobile Computing
A Hybrid Lossy Image Compression based on Wavelet Transform, Polynomial Approximation Model, Bit Plane Slicing and Absolute Moment Block Truncation
...Show More Authors

Publication Date
Fri Jan 01 2010
Journal Name
Journal Of Collage Of Education
FILTER BASES AND ω-PERFECT FUNCTIONS
...Show More Authors

In this paper introduce some generalizations of some definitions which are, closure converge to a point, closure directed toward a set, almost ω-converges to a set, almost condensation point, a set ωH-closed relative, ω-continuous functions, weakly ω-continuous functions, ω-compact functions, ω-rigid a set, almost ω-closed functions and ω-perfect functions with several results concerning them.

Preview PDF
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
An update on Nanoparticle Formulation Design of Piperine to Improve its Oral bioavailability: A Review
...Show More Authors

Piperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Design and FPGA Implementation of Matrix Multiplier Using DEMUX-RCA-Based Vedic Multiplier
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF