Preferred Language
Articles
/
lRjqcJQBVTCNdQwCzRdI
Visible Light Communication System Integrating Road Signs with the Vehicle Network Grid
...Show More Authors

Crossref
View Publication
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role and effectiveness of the United Nations Security Council in light of the competition of international powers: an analytical study
...Show More Authors

Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun May 01 2022
Journal Name
International Journal Of Multiphase Flow
Application of artificial neural network to predict slug liquid holdup
...Show More Authors

Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Automatic Identification of Ear Patterns Based on Convolutional Neural Network
...Show More Authors

Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Nov 02 2016
Journal Name
Australian Journal Of Basic And Applied Sciences
Full synchronization of 2$\times$ 2 optocouplers network using LEDs
...Show More Authors

The synchronization of a complex network with optoelectronic feedback has been introduced theoretically, with use of 2×2 oscillators network; each oscillator considered is an optocoupler (LED coupled with photo-detector). Fixing the bias current (δ) and increasing the feedback strength (Ԑ) of each oscillator, the dynamical sequence like chaotic and periodic mixed mode oscillations has been observed. Synchronization of unidirectionally coupled of light emitting diodes network has been featured when coupling strength equal to 1.7×10-4. The transition between non-synchronization and synchronization states by means of the spatio-temporal distribution has been investigated.

Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication