The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Convolutional Neural Network (CNN) has been chosen as a better option for the training process because it produces a high accuracy. The final accuracy has reached 91.18% in five different classes. The results are discussed in terms of the probability of accuracy for each class in the image classification in percentage. Cats class got 99.6 %, while houses class got 100 %.Other types of classes were with an average score of 90 % and above.
Image compression is an important tool to reduce the bandwidth and storage
requirements of practical image systems. To reduce the increasing demand of storage
space and transmission time compression techniques are the need of the day. Discrete
time wavelet transforms based image codec using Set Partitioning In Hierarchical
Trees (SPIHT) is implemented in this paper. Mean Square Error (MSE), Peak Signal
to Noise Ratio (PSNR) and Maximum Difference (MD) are used to measure the
picture quality of reconstructed image. MSE and PSNR are the most common picture
quality measures. Different kinds of test images are assessed in this work with
different compression ratios. The results show the high efficiency of SPIHT algori
Abstract\
In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the
... Show MoreThe interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm
... Show MoreA Ligand (ECA) methyl 2-((1-cyano-2-ethoxy-2-oxoethyl)diazenyl)benzoate with metals of (Co2+, Ni2+, Cu2+) were prepared and characterization using H-NMR, atomic absorption spectroscopy, ultra violet (UV) visible, magnetic moments measurements, bioactivity, and Molar conductivity measurements in soluble ethanol. Complexes have been prepared using a general formula which was suggested as [M (ECA)2] Cl2, where M = (Cobalt(II), Nickel(II) and Copper(II), the geometry shape of the complexes is octahedral.
This study investigated the effect of using brainstorming as a teaching technique on the students’ performance in writing different kinds of essays and self regulation among the secondary students. The total population of this study, consisted of (51) female students of the 5th Secondary grade in Al –kawarzmi School in Erbil during the academic year 2015-2016. The chosen sample consisted of 40 female students, has been divided into two groups. Each one consists of (20) students to represent the experimental group and the control one. Brainstorming technique is used to teach the experimental group, and the conventional method is used to teach the control group. The study inst
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
An annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo
... Show MoreSildenafil, tadalafil, and vardenafil are phosphodiesterase type 5 enzyme (PDE-5) inhibitors used for the treatment of male erectile dysfunction. This present study aims to investigate 55 herbal products indicated for men’s sexual health from the Malaysian market for adulteration of PDE-5 inhibitors and analogues. The screening and identification of 20 PDE-5 inhibitors and analogues in herbal products of various forms (powder, capsules, tablets, and pastels) were conducted using gas chromatography–electron impact-mass spectrometer (GC-EI-MS). The analysis has shown that 19 herbal products were adulterated with PDE-5 inhibitors and analogues. Unique ion fragmentations and the presence of molecular
... Show MoreExperimental programs based test results has been used as a means to find out the response of individual elements of structure. In the present study involves investigated behavior of five reinforced concrete deep beams of dimension (length 1200 x height 300 x width150mm) under two points concentrated load with shear span to depth ratio of (1.52), four of these beams with hallow core and
retrofit with carbon fiber reinforced polymer CFRP (with single or double or sides Strips). Two shapes of hallow are investigated (circle and square section) to evaluated the response of beams in case experimental behavior. Test on simply supported beam was performed in the laboratory & loaddeflection, strain of concrete data and crack pattern of