Preferred Language
Articles
/
jcoeduw-1212
HandWritten Numerals Recognition System
...Show More Authors

  Recognition is one of the basic characteristics of human brain, and also for the living   creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.

      One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwritten digits and off-line handwritten digits in same time using Genetic Algorithm.

      Genetic Algorithms (GAs), are search procedures that use the mechanics of natural selection and natural genetics, have been used in this paper to solve numbers recognition problem. The genetic algorithm treats numbers as a binary string of [6 x 10] pixels and by the process of mating and mutating; the input string is matched to the closest existing character in a database. The proposed method is tested on a sample of 500 digits written by 10 different persons and found to perform satisfactorily most of the time; this paper realized a high percentage of 85%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Usage of non-linear programming in building a mathematical model for production planning according to discount constraints put on bought amount
...Show More Authors

Abstract

 This research deals will the declared production planning operation in the general company of planting oils, which have  great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm  application on non-linear model which been more difficulty than possible solution when imposed restric

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Optimal Economic Design of Diversion Structures during Construction of a Dam by Particle Swarm Optimization
...Show More Authors

Diverting river flow during construction of a main dam involves the construction of cofferdams, and tunnels, channels or other temporary passages. Diversion channels are commonly used in wide valleys where the high flow makes tunnels or culverts uneconomic. The diversion works must form part of the overall project design since it will have a major impact on its cost, as well as on the design, construction program and overall cost of the permanent works. Construction costs contain of excavation, lining of the channel, and construction of upstream and downstream cofferdams. The optimization model was applied to obtain optimalchannel cross section, height of upstream cofferdam, and height of downstream cofferdamwith minimum construction cost

... Show More
Publication Date
Wed Oct 28 2015
Journal Name
Journal Of Mathematics And System Science
Simulating Particle Swarm Optimization Algorithm to Estimate Likelihood Function of ARMA(1, 1) Model
...Show More Authors

Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 31 2025
Journal Name
International Journal Of Advanced Technology And Engineering Exploration
Breast cancer survival rate prediction using multimodal deep learning with multigenetic features
...Show More Authors

Breast cancer is a heterogeneous disease characterized by molecular complexity. This research utilized three genetic expression profiles—gene expression, deoxyribonucleic acid (DNA) methylation, and micro ribonucleic acid (miRNA) expression—to deepen the understanding of breast cancer biology and contribute to the development of a reliable survival rate prediction model. During the preprocessing phase, principal component analysis (PCA) was applied to reduce the dimensionality of each dataset before computing consensus features across the three omics datasets. By integrating these datasets with the consensus features, the model's ability to uncover deep connections within the data was significantly improved. The proposed multimodal deep

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Charge density distributions for odd-A of 2s-1d shell nuclei
...Show More Authors

An analytical expression for the charge density distributions is derived based on the use of occupation numbers of the states and the single particle wave functions of the harmonic oscillator potential with size parameters chosen to reproduce the observed root mean square charge radii for all considered nuclei. The derived expression, which is applicable throughout the whole region of shell nuclei, has been employed in the calculations concerning the charge density distributions for odd- of shell nuclei, such as and nuclei. It is found that introducing an additional parameters, namely and which reflect the difference of the occupation numbers of the states from the prediction of the simple shell model leads to obtain a remarkabl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Using of Index Biological Integrity of Phytoplankton (P-IBI) in the Assessment of Water Quality in Don River Section
...Show More Authors

       The multimetric Phytoplankton Index of Biological Integrity (P-IBI) was applied throughout Rostov on Don city (Russia) on 8 Locations in Don River from April – October 2019. The P-IBI is composed from seven metrics: Species Richness Index (SRI), Density of Phytoplankton and total biomass of phytoplankton and Relative Abundance (RA) for blue-green Algae, Green Algae, Bacillariophyceae and Euglenaphyceae Algae. The average P-IBI values fell within the range of (45.09-52.4). Therefore, water throughout the entire study area was characterized by the equally "poor" quality. Negative points of anthropogenic impact detected at the stations are: Above the city of Rostov-on-Don (1 km, higher duct Aksai) was 38.57 i

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating Mixture of Linear Regression Models with Application
...Show More Authors

 A mixture model is used to model data that come from more than one component. In recent years, it became an effective tool in drawing inferences about the complex data that we might come across in real life. Moreover, it can represent a tremendous confirmatory tool in classification observations based on similarities amongst them. In this paper, several mixture regression-based methods were conducted under the assumption that the data come from a finite number of components. A comparison of these methods has been made according to their results in estimating component parameters. Also, observation membership has been inferred and assessed for these methods. The results showed that the flexible mixture model outperformed the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char

... Show More
View Publication Preview PDF
Crossref (3)
Clarivate Crossref