Preferred Language
Articles
/
jcoeduw-1212
HandWritten Numerals Recognition System
...Show More Authors

  Recognition is one of the basic characteristics of human brain, and also for the living   creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.

      One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwritten digits and off-line handwritten digits in same time using Genetic Algorithm.

      Genetic Algorithms (GAs), are search procedures that use the mechanics of natural selection and natural genetics, have been used in this paper to solve numbers recognition problem. The genetic algorithm treats numbers as a binary string of [6 x 10] pixels and by the process of mating and mutating; the input string is matched to the closest existing character in a database. The proposed method is tested on a sample of 500 digits written by 10 different persons and found to perform satisfactorily most of the time; this paper realized a high percentage of 85%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Evoluation of service system in the general eduction Baghdad hospital using Q GERT
...Show More Authors

That the essential contribution of this research is a description of how complex systems analysis service of the properties of the queue in Baghdad Teaching Hospital using a technique network is techniques method (Q - GERT) an acronym of the words:

Queuing theory _ Graphical Evaluation and Review Technique

Any method of assessment and review chart where you will be see the movement flow of patients within the system and after using this portal will be represented system in the form of planned network probabilistic analysis and knowledge of statistical distributions appropriate for times of arrival and departure were using the program ready (Win QSB) and simulatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Decolorization of Phenol Red Dye by Immobilized Laccase in Chitosan Beads Using Laccase - Mediator - System Model
...Show More Authors

This work describes the enhancement of phenol red decolorization through immobilizing of laccase in chitosan and enzyme recycling. Commercial laccase from white rot fungus, Trametesversicolor (Tvlac), was immobilizedin to freshly prepared chitosan beads by using glutaraldehyde as a cross linker. Characterization of prepared chitosan was confirmed by FTIR and scanning electron microscope (SEM). Tvlac (46.2 U/mL) immobilized into chitosan beads at 0.8 % glutaraldehyde (v/v) within 24 hrs. Synthetic (HBT) and natural (vanillin) mediators were used to enhance dye decolorizoation. It was found that 89 % of phenol red was decolorized by chitosan beads within 180 min. in the absence of enzyme and mediator, while decolorization percenta

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
The Association of Prothrombin Gene Mutations and Cytomegalovirus Infection with Abortion Among Iraqi Women
...Show More Authors

Abortion is categorized as the termination of conception caused by the failure or removal of the embryo from the uterus before the conclusion of pregnancy. Microorganisms and genetic factors are two of the many factors associated with abortion. Cytomegalovirus is a widespread congenital virus infection pathogen that affects a wide variety of people. The prothrombin gene is one of the essential causes that trigger blood clotting and the function of abortion women, therefore the aim of the study is to detect and associate Cytomegalovirus and prothrombin gene mutation (Gene ID: 14061 in NCBI) with abortion through genetic and immunological methods. Five ml of whole blood was collected from an intravenous puncture and divided into two tubes,

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study of the impact of foreign direct investment in the Iraqi tax system using the factorial analysis: (principal components)
...Show More Authors

The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural  reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.

The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study  the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 02 2021
Journal Name
New Trends In Information And Communications Technology Applications: 4th International Conference, Ntict 2020, Baghdad, Iraq, June 15, 2020, Proceedings 4
Iris recognition using localized Zernike features with partial iris pattern
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication