Preferred Language
Articles
/
jBiJdJQBVTCNdQwCVhjn
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Wed Aug 25 2021
Journal Name
Caai Transactions On Intelligence Technology
Shoulder girdle recognition using electrophysiological and low frequency anatomical contraction signals for prosthesis control
...Show More Authors

View Publication Preview PDF
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jun 20 2023
Journal Name
مجلة كلية التربية للبنات – الجامعة العراقية ،ت
Use of collocant food items in Arabic and English
...Show More Authors

This paper investigates the collocational use of irreversible food binomials in the lexicons of English (UK) and Arabic (Iraq), their word-order motivations, cultural background, and how they compare. Data consisted in sixteen pairs in English, versus fifteen in Arabic. Data analysis has shown their word order is largely motivated by logical sequencing of precedence; the semantically bigger or better item comes first and the phonologically longer word goes last. These apply in a cline of decreasing functionality: logical form first, semantic importance second, phonological form last. In competition, the member higher in this cline wins first membership. While the entries in each list clearly reflect culturally preferred food meals in the UK

... Show More
Publication Date
Tue Jan 10 2012
Journal Name
Journal Arts Of Thiqar
Translating English Body Part Idioms into Arabic Idiomatic Equivalences
...Show More Authors

Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
Sound Assimilation in English and Arabic: a Contrastive Study
...Show More Authors

      This piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.

     The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 21 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Clinical effects of Arabic gum (Acacia): A mini review
...Show More Authors

Gum Arabic is a natural gummy exudate gained from the trees of Acacia species (Acacia senegal and Acacia seyal), Family: Fabaceae. Gum Arabic considers as a dietary fiber with a high percentage of carbohydrates and low protein content. Sugars arabinose and ribose were originally discovered and isolated from gum Arabic and it is representing the original source of these sugars. A gum emanation from trees occurs under stress conditions such as heat, poor soil fertility, drought, and injury. Mainly gum is produced in belt region of Africa, mainly Sudan, Chad, and Nigeria. In the food industry, it is used in confectionery; in the pharmaceutical industry, it is used as emulsifier, film coating and others. Traditionally the g

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (14)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Phonological Metathesis in Iraqi Arabic Dialect: A Synchronic Perspective
...Show More Authors

Phonological metathesis can be defined as an alternation in the normal sequence of two sounds under certain conditions. The present paper is intended to give a detailed synchronic description of phonological metathesis in Iraqi Arabic dialect. For data collection, the researchers have adopted two naturalistic techniques, viz., observation and notes taking. A synchronic analysis is carried out to provide some evidence that describe the sequential change of phonological metathesis in the dialect under investigation. Such sequential changes of metathesized sounds are presented and tabulated. The study concludes with the following finding that this process is not limited to cases where two consonant sounds are transposed, but three consonant

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
2013 Ieee International Conference On Systems, Man, And Cybernetics
AWSS: An Algorithm for Measuring Arabic Word Semantic Similarity
...Show More Authors

View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More