Preferred Language
Articles
/
jhfnNY8BVTCNdQwCk2K8
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Some Geometric Properties of a Hyperbolic Univalent Function
...Show More Authors

In this paper, we analyze several aspects of a hyperbolic univalent function related to convexity properties, by assuming  to be the univalent holomorphic function maps of the unit disk  onto the hyperbolic convex region  ( is an open connected subset of). This assumption leads to the coverage of some of the findings that are started by seeking a convex univalent function distortion property to provide an approximation of the inequality and confirm the form of the lower bound for . A further result was reached by combining the distortion and growth properties for increasing inequality  . From the last result, we wanted to demonstrate the effect of the unit disk image on the condition of convexity estimation

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Evaluation of the Efficacy of Different Serological Methods (rK39 dipstick, ELISA and IFA) Techniques in the Diagnosis of Visceral leishmaniasis.
...Show More Authors

The objective of this study was to compare the sensitivity and specificity of rK39,
ELISA and IFA tests for the diagnosis of visceral leishmaniasis using blood
samples. Samples were collected from 146 suspected patients and 30 healthy
individual as control. The results showed 52 (35.62%), 58 (39.73%) and 71
(48.64%) positive samples by rK39, ELISA and IFA , respectively. IFA test showed
a higher sensitivity (48.63%) than ELISA and rk39 dip stick (39.72%) and (35.61%)
respectively. The highest sensitivity of agreement (K: 0.912) was found between
rK39 dipstick and ELISA. Therefore, we suggest the application of rK39 dipstick
and ELISA methods in endemic areas of visceral leishmaniasis for early and
accurate diag

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Review of Software Watermarking
...Show More Authors

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Space of Fuzzy Orderings
...Show More Authors

In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group  (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of  (A). 2.  an element e  A such that (e) = – 1    X. 3. X :={a  A\ (a) = 1    X} = 1. 4. If f and g are forms over A and if x  D(

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Groundwater Suitability for Agriculture using GIS Techniques in the Lower Part of Lesser Zab River Basin
...Show More Authors

Suitability of groundwater for irrigation depends upon many constrains factors, these factors depend upon the dissolved salts during the flow of the recharge of the groundwater beside the aquifer constituents itself, from these factors (EC, SO4-2, Cl-, Na%, and SAR) .The spatial distribution of each constrain factor may show discrepancy from the another, so it is not possible to depend upon one factor. The aim of this work is to present a classification of the groundwater quality for agriculture including all the mentioned five factors, by using Arc GIS which provides tools to serve a purpose to create conceptual model for solving spatial problems. A set of conceptual steps used to build a model for suitability map of groundwater for irr

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Change detection of remotely sensed image using NDVI subtractive and classification methods.
...Show More Authors

Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
How to build a virtual personal imagined in the picture, directed by James Cameron (Avatar) movie as a model
...Show More Authors

The personal drama in particular, and one of the key elements underlying the dramatic structure to convey ideas and visions presented by the author when writing the text of the dramatic fall after that on the way out the submission form that suits the proposals of the text and processors directorial would push the wheel of dramatic structure to the front. So take the maker of the artwork (writer) undertook the transfer of those events and personalities in art presumed sometimes real and sometimes, in order to enrich the art inspired by the human reality through the ages, and full of its themes and ideas that led to the development experiences of peoples experiences of living. Therefore, we find it important to research in the characters

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 19 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
New cost control techniques in mega construction projects
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Purification Techniques for Cheap Multi –Walled Carbon Nanotubes
...Show More Authors
Abstract<p>Multi-walled carbon nanotubes from cheap tubs company MWCNT-CP were purified by alcohol \ H2O2 \ separation funnel which is simple, easy and scalable techniques. The steps of purification were characterized by X-ray diffraction, Raman spectroscopy, scanning electron microscopy SEM with energy dispersive of X-ray spectroscopy EDX and surface area measurements. The technique was succeeded to remove most the trace element from MWCNT-CP which causing increase the surface area. The ratios of impurities were reduced to less 0.6% after treatment by three steps with losing less than 5% from MWCNT-CP.</p>
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref