Preferred Language
Articles
/
jcoeduw-1047
An Application Domain Based on General Object Oriented Software Models
...Show More Authors

Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects and classes in the representationalmodel and the elements in the considered system. Implementing this model on some practical examples is investigated and resulted into promising improvement in software design and understanding.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Automatic Identification of Ear Patterns Based on Convolutional Neural Network
...Show More Authors

Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Mathematics
Face Recognition Algorithm Based on Fast Computation of Orthogonal Moments
...Show More Authors

Face recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face ima

... Show More
View Publication
Scopus (33)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sat Apr 09 2016
Journal Name
Photonic Sensors
Parametric Analysis of NO2 Gas Sensor Based on Carbon Nanotubes
...Show More Authors

View Publication
Scopus (36)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sat Nov 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The role of topical application of bone morphogenetic protein 7 (BMP7) on bone healing on rabbits (Immunohistochemical study on TGF-β 3 & IGF-1R)
...Show More Authors

Background: Bone is essentially a highly vascular, living, constantly changing mineralized connective tissue. It is remarkable for its hardness, resilience and regenerative capacity, as well as its characteristic growth mechanisms. This study aimed to: 1. To evaluate the effect of bone morphogenetic protein7 (BMP7) on bone healing in artificially created intrabony defect in rabbits upper diastema, histologically. 2. To study the immunohistochemical expression of TGF-β3 and IGF-1R as bone formation markers in experimental and control groups during bone healing. Material and method: Forty male rabbits, was used in this study, 8 rabbits for each healing interval (3 days, 1,2 ,4 and 6 weeks). In each rabbit two bone holes were created on th

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Judicial Accounting and its impact on the outcome of the activity of the Iraqi General Insurance Company: applied research
...Show More Authors

The research aims to shed light on the importance of forensic accounting and its impact on the outcome of the activity of the Iraqi general insurance company by winning the lawsuits filed against the company because the forensic accountant (the judicial expert) possesses the ability to interpret and analyze the data. The research community represents the insurance companies in Iraq. Iraqi insurance, and the researchers adopted the descriptive approach in covering the theoretical aspect and the deductive approach in covering the practical side, depending on the financial statements of the Iraqi insurance company for the years of research.

One of the most important conclusions reached by the researchers was that forensic accounting

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 16 2023
Journal Name
F1000research
Assessment of general population knowledge, attitude, and practice on safe unused and expired drugs disposal: a cross-sectional study
...Show More Authors

Background The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa

... Show More
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the rebound effect and interactive between fiscal and monetary policy on the General economic equilibrium (IS-LM)
...Show More Authors

      Will address this research interaction and coordination between fiscal and monetary policies and the impact of this interaction and coordination on economic stability and growth، and how the financial implications of monetary policy may stimulate action monetary policy and treatment side effects and the nature of responsiveness and bounce between procedures both two policies and their impact on the balance of overall economic and explained in the folds of searchjustifications coordination and the extent necessary in order to address the imbalances in economic activity through twinning actions of monetary and fiscal، has embodied this coordination and interaction between policies and their impact m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication