Preferred Language
Articles
/
joe-2152
Face Identification Using Back-Propagation Adaptive Multiwavenet
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a recognition rate of 97.75% in the presence of facial expression, lighting and pose variations. Results are compared with its wavelet-based counterpart where it obtained a recognition rate of 10.4%. The proposed multiwavenet demonstrated very good recognition rate in the presence of variations in facial expression, lighting and pose and outperformed its wavelet-based counterpart.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 26 2022
Journal Name
Neuroquantology
Efficiency Evaluation of Optical System Includes Different Stop Apertures When Using Relative Moving Factor
...Show More Authors

In this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.

View Publication
Crossref (2)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Nov 01 2011
Journal Name
Journal Of The Saudi Society Of Dermatology & Dermatologic Surgery
Treatment of pityriasis versicolor using 1% diclofenac gel and clotrimazole cream (comparative therapeutic study)
...Show More Authors

KE Sharquie, HM Al-Hamamy, AA Noaimi, IA Al-Shawi, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2011 - Cited by 9

View Publication
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Biosynthesis, Characterization, Adsorption and Antimicrobial studies of Vanadium Oxide Nanoparticles Using Punica Granatum Extract
...Show More Authors

This study includes using green or biosynthesis-friendly technology, which is effective in terms of low cost and low time and energy to prepare V2O5NPs nanoparticles from vanadium sulfate VSO4.H2O using aqueous extract of Punica Granatum at a concentration of 0.1M and with a basic medium PH= 8-12. The V2O5NPs nanoparticles were diagnosed using several techniques, such as FT-IR, UV-visible with energy gap Eg = 3.734eV, and the X-Ray diffraction XRD was calculated using the Debye Scherrer equation. It was discovered to be 34.39nm, Scanning Electron Microscope (SEM), Transmission Electron Microscopy TEM. The size, structure, and composition of synthetic V2O5

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Biosynthesis, Characterization, Adsorption and Antimicrobial studies of Manganese oxide Nanoparticles Using Punica Granatum Extract
...Show More Authors

Manganese sulfate and Punica granatum plant extract were used to create MnO2 nanoparticles, which were then characterized using techniques like Fourier transform infrared spectroscopy, ultraviolet-visible spectroscopy, atomic force microscopy, X-ray diffraction, transmission electron microscopy, scanning electron microscopy, and energy-dispersive X-ray spectroscopy. The crystal's size was calculated to be 30.94nm by employing the Debye Scherrer equation in X-ray diffraction. MnO2 NPs were shown to be effective in adsorbing M(II) = Co, Ni, and Cu ions, proving that all three metal ions may be removed from water in one go. Ni(II) has a higher adsorption rate throughout the board. Co, Ni, and Cu ion removal efficiencie

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Wed Aug 07 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of the Cardiac Patients Knowledge toward Using Anticoagulant Medications at Missan Governorate Hospitals
...Show More Authors

Objective- the study aim to determine the cardiac patient knowledge about anticoagulant medications using and its relationship with demographic data(age. gender. level of education. occupational). Methodology- A descriptive study(quasi-experimental)design was carried out to determine cardiac patient knowledge consider to using anticoagulant medications . Starting from(1th Jun 2017 to5th October 2018).To achieve the objectives of the study, a non-probability sample (a purposive sample) consisted of random sample comprised of (30) patients were taken anticoagulant medications ..The measurement of patient knowledge were collected through the use of questionnaire which is related to patient knowledge toward using the anticoagulant medication

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Test Engineering & Management
Strengthening of non-liner finite element RCMD Beam with Large Square Opening Using CFRP
...Show More Authors