Preferred Language
Articles
/
jcoeduw-1361
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Convolutional Neural Network (CNN) has been chosen as a better option for the training process because it produces a high accuracy. The final accuracy has reached 91.18% in five different classes. The results are discussed in terms of the probability of accuracy for each class in the image classification in percentage. Cats class got 99.6 %, while houses class got 100 %.Other types of classes were with an average score of 90 % and above.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 26 2019
Journal Name
Dental Materials Journal
Semi-interpenetrating network composites reinforced with Kevlar fibers for dental post fabrication
...Show More Authors

View Publication
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Dynamic Virtual Network Embedding with Latency Constraint in Flex-Grid Optical Networks
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: Oil production, Depletion resources, Generations rights, Norway experience, Sustainable development.
...Show More Authors

 

Abstract

      Oil is the most important natural resources in Iraq and represents the goal to others as well as Iraqi people. It is gift from God to all Iraqi people now and future. So we must maintain it and invest its revenue that achieve development in country and ensure the next generations' rights in it without external costs or negative externalities from extracted and invested it.

    The most problems that we attempt to solve by this research are the exhausted, environmental degradation and theft from next generation that produced with oil contracts between Iraq and foreign companies. From here was th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 23 2023
Journal Name
Arab Science Heritage Journal
العلاقات السياسية والعسكرية للإمارة العلوية في طبرستان مع الإمارة الطاهرية والصفارية والسامانية
...Show More Authors

The stage of the establishment of the Alawite state in tabaristan was one of the most important stages in the history of the Shiite sect in Iran

View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Political Sciences Journal
انتخابات الرئاسة الامريكية : الالية والاهداف مع الاشارة خاصة الى انتخابات 2008-2012
...Show More Authors

انتخابات الرئاسة الامريكية : الالية والاهداف مع اشارة خاصة الى انتخابات 2008-2012

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 15 2011
Journal Name
Journal Of College Of Education
تحضيروتشخيص بعض المعقدات الفلزية مع ليكاندات مختلطة من ا*موكسولين و٣-بيكولين
...Show More Authors

يتضمن ھذا البحث تحضير وتشخيص بعض المعقدات الفلزية التي تحوي على ليكاندات مختلطة ل (Amoxicillin)( Axn (و(Picoline-٣) (Pic-٣ (وقد تم دراسة ھذه المعقدات بالطرائق الطيفية (اIشعة تحت الحمراء و اIشعة المرئية –فوق البنفسجية والتوصيلية الموIرية والحساسية المغناطيسية ، ومن نتائج ھذه الدراسات التشخيصية امكن اعطاء الصيغة المقترحة العامة لھذه المعقدات و كاIتي

Publication Date
Mon Dec 26 2022
Journal Name
Arab Science Heritage Journal
العلاقات السياسية والعسكرية للإمارة العلوية في طبرستان مع الإمارة الطاهرية والصفارية والسامانية
...Show More Authors

The stage of the establishment of the Alawite state in tabaristan was one of the most important stages in the history of the Shiite sect in Iran , from a political , religious and even military point of view ,

View Publication Preview PDF
Publication Date
Sat Sep 20 2025
Journal Name
Al-hiqouq
حوالة العقد دراسة في القانونين الفرنسي والانجليزي مع الاشارة للقانوني الايطالي والعراقي
...Show More Authors

View Publication
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Experimental Investigation of Heat Transfer Enhancement in a Double Pipe Heat Exchanger Using Compound Technique of Transverse Vibration and Inclination Angle
...Show More Authors

Numerous tests are recently conducted to assess vibration's role in accelerating the heat transfer rate in various heat exchangers. In this work, the enhancement of heat transfer by the effect of transfer vibration and inclination angles on the surface of a double pipe heat exchanger experimentally has been investigated. A data acquisition system is applied to record the data of temperatures, flow rates, and frequencies over the tests. A compound technique was adopted, including the application of a set of inclination angles of (0°, 10°, 20°, and 30°) under the effect of frequency of vibration ranging from sub-resonance to over-resonance frequencies. The results showed that the overall heat transfer coefficient enhan

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref