Preferred Language
Articles
/
jih-2122
Modeling Dynamic Background based on Linear Equation
...Show More Authors

     Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86% and FoM 90%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
The Linear and Nonlinear Electro-Mechanical Fin Actuator
...Show More Authors

Electromechanical actuators are used in a wide variety of aerospace applications such as missiles, aircrafts and spy-fly etc. In this work a linear and nonlinear fin actuator mathematical model has been developed and its response is investigated by developing an algorithm for the system using MATLAB. The algorithm used to the linear model is the state space algorithm while the algorithm used to the nonlinear model is the discrete algorithm. The huge moment constant is varied from (-3000 to 3000) and the damping ratio is varied from (0.4 to 0.8).        

 The comparison between linear and nonlinear fin actuator response results shows that for linear model, the maximum overshoot is about 10%,

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
numerical solution of nth order linear dealy differential
...Show More Authors

in this paper fourth order kutta method has been used to find the numerical solution for different types of first liner

View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetic of structural relationships in linear formations
...Show More Authors

This research is concerned with the study of (the aesthetic of constructive relations in linear composition) with what distinguished Arabic calligraphy through the style and artistic method in its construction, and the specifications it carries that enabled it to pay attention to building formations to achieve in its total linear ranges aesthetic values and relationships. Through the research, the models and the exploratory study that he obtained, the researcher was able to raise the research problem in the first chapter according to the following question: What is the aesthetic of constructive relations in linear formation?
The importance of the research in achieving the aesthetics of the formations, which is a wide field according t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
Fuzzy Linear Discriminant Analysis Clustering With Its Application
...Show More Authors

Many fuzzy clustering are based on within-cluster scatter with a compactness measure , but in this paper explaining new fuzzy clustering method which depend on within-cluster scatter with a compactness measure and between-cluster scatter with a separation measure called the fuzzy compactness and separation (FCS). The fuzzy linear discriminant analysis (FLDA) based on within-cluster scatter matrix and between-cluster scatter matrix . Then two fuzzy scattering matrices in the objective function assure the compactness between data elements and cluster centers .To test the optimal number of clusters using validation clustering method is discuss .After that an illustrate example are applied.

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Interdisciplinary Mathematics
Computations for the special linear group (2, 49)
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Iraqi Journal Of Science
Geological Modeling for Yamama Formation in Abu Amood Oil Field
...Show More Authors

3D geological model of a simple petroleum reservoir for Yamama Formation has
been built in Abu Amood Oil Field using Petrel software, which is a product of
Schlumberger. This model contains the structure, stratigraphy and reservoir
properties (porosity and water saturation) in three directions(X, Y and Z).Geologic
modeling is an applied science of creating computerized representations of portions
of the earth's crust, especially oil and gas fields.
Yamama Formation in Abu Amood Oil Field is divided into thirteen zones by
using well logs and their petrophysical properties, six of which are reservoir zones.
From the top of the formation these six zones are: (YB-1, YB-2, YB-3, YC-1, YC-2
and YC-3). These reservoir

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref