Preferred Language
Articles
/
jih-1074
Artificial Neural Network for TIFF Image Compression
...Show More Authors

The main aim of image compression is to reduce the its size to be able for transforming and storage, therefore many methods appeared to compress the image, one of these methods is "Multilayer Perceptron ". Multilayer Perceptron (MLP) method which is artificial neural network based on the Back-Propagation algorithm for compressing the image. In case this algorithm depends upon the number of neurons in the hidden layer only the above mentioned will not be quite enough to reach the desired results, then we have to take into consideration the standards which the compression process depend on to get the best results. We have trained a group of TIFF images with the size of (256*256)  in our research, compressed them by using MLP for each compression process the number of neurons in the hidden layer was changing and calculating the compression ratio, mean square error and peak signal-to-noise ratio to compare the results to get the value of  original image. The findings of the research was the desired results as the compression ratio was less than five and a few mean square error thus a large value of peak signal-to-noise ratio had been recorded.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 03 2019
Journal Name
Rawal Medical Journal
Evaluation of low back pain among female obese patients and associated risk factors
...Show More Authors

Background: obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific low back pain (LBP). However, the relationship between obesity and LBP remain to date unsupported by an objective measurement of the mechanical behavior of spine and it is morphology in obese subjects. . Objectives: To identify the relationship between obesity and LBP regarding (height, weight, sleeping, chronic diseases, smoking, and steroid). Method: A cross-sectional study was conducted from the first of January 2016 to January 2018 in obe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Theoretical Study of Elastic Electron Scattering from 8B, 17Ne, 11Be and 11Li Halo Nuclei
...Show More Authors

     The nuclear density distributions and size radii are calculated for one-proton 8B, two-proton 17Ne, one-neutron 11Be and two-neutron 11Li halo nuclei. The theoretical outlines of calculations assume that the nuclei understudy are composed of two parts: the stable core and the unstable halo. The core part is studied using the radial wave functions of harmonic-oscillator (HO) potentials, while the halo is studied through Woods-Saxon (WS) potential. The long tail behaviour which is the main characteristic of the halo nuclei are well generated in comparison with experimental data. The calculated size radii are in good agreement with experimental values. The elastic electron scattering form

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Employ Stress-Strength Reliability Technique in Case the Inverse Chen Distribution
...Show More Authors

This paper uses classical and shrinkage estimators to estimate the system reliability (R) in the stress-strength model when the stress and strength follow the Inverse Chen distribution (ICD). The comparisons of the proposed estimators have been presented using a simulation that depends on the mean squared error (MSE) criteria.

 

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Restoration of Digital Images Using an Iterative Filter Algorithm
...Show More Authors

Digital image started to including in various fields like, physics science, computer science, engineering science, chemistry science, biology science and medication science, to get from it some important information. But any images acquired by optical or electronic means is likely to be degraded by the sensing environment. In this paper, we will study and derive Iterative Tikhonov-Miller filter and Wiener filter by using criterion function. Then use the filters to restore the degraded image and show the Iterative Tikhonov-Miller filter has better performance when increasing the number of iteration To a certain limit then, the performs will be decrease. The performance of Iterative Tikhonov-Miller filter has better performance for less de

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use Of Genetic Algorithm In Estimating The Parameter Of Finite Mixture Of Linear Regression
...Show More Authors

The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To

... Show More
View Publication
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adaptive Canny Algorithm Using Fast Otsu Multithresholding Method
...Show More Authors

   In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm.      The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.  
 

View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Levels of Some Blood Clotting Factors in COVID-19 Patients: Comparative Study Before and After Pfizer- BioNTech Vaccinations
...Show More Authors

One of the health issues that a coronavirus can induce is blood clotting. Coronavirus can be prevented in a number of ways. Vaccination is one of the critical methods for preventing illness or lessening its impact. This study seeks to estimate a few blood coagulation variables. 147 samples were collected from the Baghdad Governorate in the autumn of 2021. The samples were split into three groups: COVID-19 patients, healthy individuals before and after receiving the (Pfizer-BioNTech) vaccine, and healthy individuals only. Prothrombin Time (PT), Partial Thromboplastin Time (PTT), Protein C (PTN-C), Protein S (PTN-S), and International Normalized Ratio (INR) for 49 samples were measured and computed for each group. The results have shown th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Performance Analysis of Propagation in VHF Military Tactical Communication System
...Show More Authors

The main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
Elastic electron scattering from 11Li and 12Be exotic nuclei in the framework of the binary cluster model
...Show More Authors

The ground state densities of unstable neutron-rich 11Li and 12Be exotic nuclei are studied in the framework of the binary cluster model (BCM). The internal densities of the clusters are described by the single particle harmonic oscillator wave functions. The long tail performance is clearly noticed in the calculated neutron and matter density distributions of these nuclei. The structures of the two valence neutrons in 11Li and 12Be are found to be mixed configurations with dominant (1p1/2)2. Elastic electron scattering proton form factors for 11Li and 12Be are studied using the plane wave Born approximation (PWBA). It is found that the major difference between the calculated form factors of unstable nuclei [11Li, 12Be] and those of stab

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref