Preferred Language
Articles
/
jih-1056
Studying Hueckel Edge Detector Using Binary Step Edge Image

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Human Action Recognition Based on Bag-of-Words

Human action recognition has gained popularity because of its wide applicability, such as in patient monitoring systems, surveillance systems, and a wide diversity of systems that contain interactions between people and electrical devices, including human computer interfaces. The proposed method includes sequential stages of object segmentation, feature extraction, action detection and then action recognition. Effective results of human actions using different features of unconstrained videos was a challenging task due to camera motion, cluttered background, occlusions, complexity of human movements, and variety of same actions performed by distinct subjects. Thus, the proposed method overcomes such problems by using the fusion of featur

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Plagiarism Detection Methods and Tools: An Overview

Plagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical

... Show More
Scopus (24)
Crossref (16)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
On (k,m)-n-Paranormal Operators

     The new type of paranormal operators that have been defined in this study on the Hilbert space, is  paranormal operators. In this paper we introduce and discuss some properties of this concept such as: the sum and product of two paranormal, the power of paranormal. Further, the relationships between the paranormal operators and other kinds of paranormal operators have been studied.

Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Some Properties of Algebraically Paranormal Operator

Through this study, the following has been proven, if  is an algebraically paranormal operator acting on separable Hilbert space, then  satisfies the ( ) property and  is also satisfies the ( ) property for all . These results are also achieved for  ( ) property.

   In addition, we prove that for a polaroid operator with finite ascent then after the property ( ) holds for  for all .

Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
On The extension Bi-Normality of Linear Operators

    In this paper, we introduce the bi-normality set, denoted by , which is an extension of the normality set, denoted by  for any operators  in the Banach algebra . Furthermore, we show some interesting properties and remarkable results. Finally, we prove that it is not invariant via some transpose linear operators.

Scopus (1)
Scopus Crossref
View Publication
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
On Truncated of General Family of Baskakov –Type Operators

Recently, in 2014 [1] the authors introduced a general family of summation integral Baskakov-type operators ( ) . In this paper, we investigate approximation properties of partial sums for this general family.

View Publication Preview PDF
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Properties of ~ Self-Adjoint and ~ Positive Operators in b- Hilbert Space

In this paper, we will introduce a new concept of operators in b-Hilbert space, which is respected to self- adjoint operator and positive operator. Moreover we will show some of their properties as well as the relation between them.

View Publication Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
An Improved Probability Density Function (PDF) for Face Skin Detection

      Face Detection by skin color in the field of computer vision is a difficult challenge. Detection of human skin focuses on the identification of pixels and skin-colored areas of a given picture. Since skin colors are invariant in orientation and size and rapid to process, they are used in the identification of human skin. In addition features like ethnicity, sensor, optics and lighting conditions that are different are sensitive factors for the relationship between surface colors and lighting (an issue that is strongly related to color stability). This paper presents a new technique for face detection based on human skin. Three methods of Probability Density Function (PDF) were applied to detect the face by skin color; these ar

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication