Preferred Language
Articles
/
jeasiq-1839
Use A State Space Model and Forecast House Prices in Baghdad.
...Show More Authors

The purchase of a home and access to housing is one of the most important requirements for the life of the individual and the stability of living and the development of the prices of houses in general and in Baghdad in particular affected by several factors, including the basic area of the house, the age of the house, the neighborhood in which the housing is available and the basic services, Where the statistical model SSM model was used to model house prices over a period of time from 2000 to 2018 and forecast until 2025 The research is concerned with enhancing the importance of this model and describing it as a standard and important compared to the models used in the analysis of time series after obtaining the series of time above prices of houses in two decades in the Mansour district of Baghdad, It was chosen for being an important neighborhood of Baghdad and services are available that are ideal compared to other neighboring neighborhoods Which lies within the province of Baghdad The possibility of applying the SSM model to the time series analysis and the prediction was achieved. The statistical analysis was carried out using the E-views version 9 program and the Kalman filter was applied in the construction of the case space model, prediction and update after estimating the state variable in the model to enhance the quality And the efficiency of this type of modeling and representation of the best representation of the data studied.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Detect The Infected Medical Image Using Logic Gates
...Show More Authors

   This paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process  images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate inj

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Efficient Hybrid DCT-Wiener Algorithm Based Deep Learning Approach For Semantic Shape Segmentation
...Show More Authors

    Semantic segmentation is effective in numerous object classification tasks such as autonomous vehicles and scene understanding. With the advent in the deep learning domain, lots of efforts are seen in applying deep learning algorithms for semantic segmentation. Most of the algorithms gain the required accuracy while compromising on their storage and computational requirements. The work showcases the implementation of Convolutional Neural Network (CNN) using Discrete Cosine Transform (DCT), where DCT exhibit exceptional energy compaction properties. The proposed Adaptive Weight Wiener Filter (AWWF) rearranges the DCT coefficients by truncating the high frequency coefficients. AWWF-DCT model reinstate the convolutional l

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Color Image Steganography Using Gradient Selective Bezier Curves
...Show More Authors

     Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Technique For Image De-blurring Using Adaptive Wavelet Lagrange Fuzzy Filter
...Show More Authors

A new de-blurring technique was proposed in order to reduced or remove the blur in the images. The proposed filter was designed from the Lagrange interpolation calculation with adjusted by fuzzy rules and supported by wavelet decomposing technique. The proposed Wavelet Lagrange Fuzzy filter gives good results for fully and partially blurring region in images.
 

View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Single-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor (Q)
...Show More Authors

Single-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor Q Configuration is proposed. This paper discusses a new configuration to realize third-order low pass, band pass and high pass. The presented circuit uses Single-input Multiple-output signals, OP-AMP and passive components. This filter is useful for high frequency operation, monolithic IC implementation and it is easy to design .This circuit gives three filter functions low-pass, high-pass and band-pass. This filter circuit can be used for different merit factor (Q) with high pass band gain. This gives better stop-band attenuation and sharper cut-off at the edge of the pass-band. Thus the response shows wider pass-band. The Ideal value of thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Different Resolution Merging Methods For Environmental Areas Extraction
...Show More Authors

The usage of remote sensing techniques in managing and monitoring the environmental areas is increasing due to the improvement of the sensors used in the observation satellites around the earth. Resolution merge process is used to combine high resolution one band image with another one that have low resolution multi bands image to produce one image that is high in both spatial and spectral resolution. In this work different merging methods were tested to evaluate their enhancement capabilities to extract different environmental areas; Principle component analysis (PCA), Brovey, modified (Intensity, Hue ,Saturation) method and High Pass Filter methods were tested and subjected to visual and statistical comparison for evaluation. Both visu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Achieving customer satisfaction by booking electronic flight tickets via the Internet of Things technology
...Show More Authors

Abstract:

                The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 30 2018
Journal Name
حولیات أداب عین شمس
وظیفة العبارة الاصطلاحیة فی المقال السیاسی مقالات بن درور یمینی نموذجاً دراسة تحلیلیة - تداولیة
...Show More Authors

Abstract This research sheds lights on one of the important rhetorical linguistics methods, which is the idioms phrase and its use in the Israeli political article. By the studying of its most prominent types and different grammatical structures, and its deliberative function. The application of this study was the articles of the Israeli journalist Ben-Dror Yemini. Which were published on the website of Israeli newspaper " Maariv" in (2011-2012). This research is divided into two devotions: theoretically and practically. The theoretical side included an introduction to identify the article generally, and the political article. Practically with a review of the most important definitions concerned with the idioms phrase and showing i

... Show More
View Publication
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Local Stability of Cournot Equilibrium as the Number of Firms Increases
...Show More Authors

In this paper, a Cournot oligopoly with isoelastic demand function and constant marginal cost is considered. The local stability conditions of the Cournot equilibrium are determined for four models with different decision mechanisms. In the first model, firms adjust their outputs using the best reply response with naive expectations. The second model is a generalization of the first one, where firms have adaptive expectations. Meanwhile, the third and fourth models adopt the bounded rationality and local monopolistic approximation, respectively. The results show that, in the case of identical firms, the Cournot equilibrium is always stable when the firms adopt the local monopolistic approximation mechanism.

View Publication Preview PDF
Scopus Crossref