Preferred Language
Articles
/
kxb6BIcBVTCNdQwCjS17
Face Recognition Algorithm Based on Fast Computation of Orthogonal Moments
...Show More Authors

Face recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face image datasets, ORL and FEI. Different state-of-the-art face recognition methods were compared with the proposed method in order to evaluate its accuracy. We demonstrate that the proposed method achieves the highest recognition rate in different considered scenarios. Based on the obtained results, it can be seen that the proposed method is robust against noise and significantly outperforms previous approaches in terms of speed.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Industrial Engineering & Management Systems
Optimizing the Complex Systems Reliability Using Mixed Strategy in Ultra-fast Gas Turbine Protection System
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 26 2022
Journal Name
Electrical Engineering
Optimal insulation design of form-wound stator winding with stress grading system under fast rise-time excitation
...Show More Authors

The effective insulation design of the stress grading (SG) system in form-wound stator coils is essential for preventing partial discharges and excessive heat generation under pulse-width modulation excitation. This paper proposes a method to find the optimal insulation design of the SG system aimed at reducing the dielectric and thermal stresses in the machine coil. The non-uniform transmission line model is used to predict the voltage propagation along the overhang, SG, and slot regions considering the variation in the physical properties of the insulation layers. The machine coil parameters for different insulation materials are calculated by using the finite element method. Two optimization algorithms, fmincon and particle swarm optimiz

... Show More
Crossref (1)
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Adopting International Financial Reporting Standard No. (9) Financial Instruments - Recognition and Measurement of Accounting for Shares and its Reflection on the Financial Statements of Companies
...Show More Authors

Many financial institutions invest their surplus funds in stocks, either to obtain dividends or for trading purposes and to obtain profits from the difference between the cost and the selling price, and investment in shares represents an important part of the financial position of financial institutions applying to the common accounting system of banks and insurance companies, in addition to their impact It is clear on the result of the activity of these institutions.The aim of the research is to define what the shares and their types are, and to indicate the accounting treatments needed to move towards the process of adopting the International Financial Reporting Standard No. (9) and its reflection on its financial statements. I

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
An Investigation of Iraqi Fourth-Year University Students’ Recognition of Presupposition Through The Linguistic Triggers
...Show More Authors

Presupposition is the background belief that is known by both the speaker and the addressee, it is tied to particular words and aspects of the surface structure that act as linguistic triggers. The present study aims at investigating whether Iraqi fourth -year university students are able to recognize the English presuppositions through the meaning of these linguistic triggers .To fulfil the basic requirements of the study, the researcher has conducted a test . The results of the study have validated the hypothesis of the work and it is found that the linguistic triggers are important tools in recognizing presuppositions.    

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using Iterative Reweighting Algorithm and Genetic Algorithm to Calculate The Estimation of The Parameters Of The Maximum Likelihood of The Skew Normal Distribution
...Show More Authors

Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 21 2018
Journal Name
Al–bahith Al–a'alami
Ways to face rumors in the social networking site Facebook: Research thesis from the PhD thesis
...Show More Authors

The research deals with the subject of «ways to face rumors in the site of social networking Facebook», a research based on a doctoral thesis, as the research dealt with rumors in the most dangerous type of new media, which sites of social communication with the global community as spreading rumors of all kinds and afflicts everyone who has eyes on him Of the audience of these sites, and aims to identify the rumors on Facebook because it is one of the most popular sites in the world and the strategy of combating the rumors published by Facebook users in their personal pages and groups that organize them, as well as identify methods and methods that can be During which the face of the rumors in the said site and eliminate them t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref