Preferred Language
Articles
/
jih-63
Genetic –Based Face Retrieval Using Statistical Features
...Show More Authors

Content-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In addition, the energy, and the entropy which based on the gray level values in an image is too considered as the features. In addition to statistical approaches, models of artificial intelligence produce a desirable methodology that enhances performance in information retrieval systems, and the genetic algorithm depicts one of them. The GA is preferred for its power and because it can be used without any specific information of the domain. The experimental results conclude that using GA gives a good performance and it decreases the average search time to (60.15 milliseconds) compared with (722.25milliseconds) for traditional search.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
2015 Annual Ieee Systems Conference (syscon) Proceedings
Automatic generation of fuzzy classification rules using granulation-based adaptive clustering
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Oil spill classification based on satellite image using deep learning techniques
...Show More Authors

 An oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing

... Show More
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Performance of STBC Based MIMO-OFDM Using Pilot-aided Channel Estimation
...Show More Authors

Many studies have been published to address the growing issues in wireless communication systems. Space-Time Block Coding (STBC) is an effective and practical MIMO-OFDM application that can address such issues. It is a powerful tool for increasing wireless performance by coding data symbols and transmitting diversity using several antennas. The most significant challenge is to recover the transmitted signal through a time-varying multipath fading channel and obtain a precise channel estimation to recover the transmitted information symbols. This work considers different pilot patterns for channel estimation and equalization in MIMO-OFDM systems. The pilot patterns fall under two general types: comb and block types, with

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Https://www.researchgate.net/journal/iop-conference-series-materials-science-and-engineering-1757-899x
Application of multivariate statistical techniques in the evaluation of large-scale water treatment plants in Baghdad.
...Show More Authors
Abstract<p>This paper aims to evaluate large-scale water treatment plants’ performance and demonstrate that it can produce high-level effluent water. Raw water and treated water parameters of a large monitoring databank from 2016 to 2019, from eight water treatment plants located at different parts in Baghdad city, were analyzed using nonparametric and multivariate statistical tools such as principal component analysis (PCA) and hierarchical cluster analysis (HCA). The plants are Al-Karkh, Sharq-Dijlah, Al-Wathba, Al-Qadisiya Al-Karama, Al-Dora, Al-Rasheed, Al-Wehda. PCA extracted six factors as the most significant water quality parameters that can be used to evaluate the variation in drinkin</p> ... Show More
Crossref
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Political Thought in Russia During the 21st Century, Targets and Features
...Show More Authors

The features of strategic thought transformation in Russia based on attempt confirm the Russian influenced on Region of Eastern Europe through series of common defense treaties and mutual security between USSR and another states this treaties emphasis size on direct Russian supervision on these states in addition, Russia in trusted to formation communism regimes in its vital space, Russia inherited the status of former USSR in political and economic levels.

           Shortly we can see that Russia witnessed large Transformation in political strategic thought as a result of change in internal strategic environment and change of nature understanding which influenced on Russia. This

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Bionatura
Chronic Myeloid Leukemia: A retrospective study of clinical and pathological features
...Show More Authors

Chronic myeloid leukemia (CML), is one of the myeloproliferative disorders with a characteristic cytogenetic abnormality resulting in the BCR-ABL fusion gene. Imatinib Mesylate is an effective agent for treating patients in all stages of CML. According to the annual Iraqi cancer registry 2019, the total number of chronic myeloproliferative disorders was 338. The percentage and incidence rates were 0.94% and 0.86%, respectively, with a higher incidence rate in males than females (1.12 in males and 0.60 in females). In this registry, no details about CML, so this study aimed to estimate the number of CML patients who attended the national center of hematology from 2005 until 2020 and investigate their epidemiological and clinic-pathol

... Show More
View Publication
Scopus (25)
Crossref (5)
Scopus Crossref