Preferred Language
Articles
/
jih-1074
Artificial Neural Network for TIFF Image Compression
...Show More Authors

The main aim of image compression is to reduce the its size to be able for transforming and storage, therefore many methods appeared to compress the image, one of these methods is "Multilayer Perceptron ". Multilayer Perceptron (MLP) method which is artificial neural network based on the Back-Propagation algorithm for compressing the image. In case this algorithm depends upon the number of neurons in the hidden layer only the above mentioned will not be quite enough to reach the desired results, then we have to take into consideration the standards which the compression process depend on to get the best results. We have trained a group of TIFF images with the size of (256*256)  in our research, compressed them by using MLP for each compression process the number of neurons in the hidden layer was changing and calculating the compression ratio, mean square error and peak signal-to-noise ratio to compare the results to get the value of  original image. The findings of the research was the desired results as the compression ratio was less than five and a few mean square error thus a large value of peak signal-to-noise ratio had been recorded.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 23 2025
Journal Name
Patents At Diyala University
جهاز (قفاز قياس القوة)
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Response of The Ionospheric E- Region Critical Frequency and Virtual Height to the Solar Cycle 22 over Baghdad
...Show More Authors

      The aim of this study is to investigate the response of the Ionospheric E- region critical frequency foE and virtual height h’E parameters to the solar cycle 22 over Baghdad city (latitude 33.3˚N, longitude 44.4˚E). Both parameters display a high relationship with the sunspot relative number within the ascending and descending phases of the solar cycle. The E - region response to the solar activity is obvious around noon, sunrise and sunset times. Moreover, the gap between local mid-afternoon, dawn and sunset values expands as solar activity rises. In the declining phase, there is an aspect that results in a peak of disturbance. This portion may have

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The strategy of applying quality indicators to educational outcomes according to market requirements - a fundamental study
...Show More Authors

 

A research study in which a methodology for quality indicators that can be adopted to evaluate the educational process in educational institutions within a specific strategy helps individuals in charge of educational education to make appropriate decisions based on accurate and properly approved plans to achieve successful outcomes.

These indicators can be used to judge the quality of educational institutions in order to improve, improve and develop them. This study has concluded the necessity of putting quality into actual application in order to benefit from it in evaluating the future action of Iraqi educational institutions.

The external changes brought about by technology and family life have made the

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Solving Linear and Nonlinear Fractional Differential Equations Using Bees Algorithm
...Show More Authors

A numerical algorithm for solving linear and non-linear fractional differential equations is proposed based on the Bees algorithm and Chebyshev polynomials. The proposed algorithm was applied to a set of numerical examples. Faster results are obtained compared to the wavelet methods.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 23 2025
Journal Name
Al-nahrain Journal For Engineering Sciences
Optimum Height of Plate Stiffener under Pressure Effect
...Show More Authors

The economical design of plate loaded by pressure can be obtained by using stiffeners instead of increasing the thickness of plate. The main subject of this work is to obtain the effect of stiffener height on the maximum stress in the plate subjected to pressure load. Different plate-stiffener sets are selected to find the effects of stiffener thickness, plate dimensions and pressure, on the optimum stiffener height. The models under consideration are square plates clamped rigidly from four edges. Finite Element method is used to analyze 160 different models by using the Finite Element software package ANSYS version 11. Another analysis method based on maximum stress equation is used to analyze 30 models. The graphical comparison of results

... Show More
View Publication
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Estimating the Reliability Function of (2+1) Cascade Model
...Show More Authors

This paper discusses reliability R of the (2+1) Cascade model of inverse Weibull distribution. Reliability is to be found when strength-stress distributed is inverse Weibull random variables with unknown scale parameter and known shape parameter. Six estimation methods (Maximum likelihood, Moment, Least Square, Weighted Least Square, Regression and Percentile) are used to estimate reliability. There is a comparison between six different estimation methods by the simulation study by MATLAB 2016, using two statistical criteria Mean square error and Mean Absolute Percentage Error, where it is found that best estimator between the six estimators is Maximum likelihood estimation method.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref