Preferred Language
Articles
/
phcaNo8BVTCNdQwC4WKq
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estimation through working with rough set theory. The results obtained from most code sets show that Bees algorithm better than ID3 in decreasing the number of extracted rules without affecting the accuracy and increasing the accuracy ratio of null values estimation, especially when the number of null values is increasing

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study and Analysis of Concentric Shell and Double Tube Heat Exchanger Using Tio2 Nanofluid
...Show More Authors

In this paper, nanofluid of TiO2/water of concentrations of 0.002% and 0.004% volume was used. This nanofluid was flowing through heat exchanger of shell and concentric double tubes with counter current flow to the hot oil. The thermal conductivity of nanofluid is enhanced with increasing concentrations of the TiO2, this increment was by 19% and 16.5% for 0.004% and 0.002% volume respectively relative to the base fluid (water). Also the heat transfer coefficient of the nanofluid is increased as Reynold's number and nanofluid concentrations increased too. The heat transfer coefficient is increased by 66% and 49% for 0.004% and 0.002% volume respectively relative to the base fluid. This study showed that the friction

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Advances In Mechanical Engineering
Using a spherical inverted pendulum and statokinesigram for modeling and evaluating quiet standing posture
...Show More Authors

This paper proposes a new approach to model and analyze erect posture, based on a spherical inverted pendulum which is used to mimic the body posture. The pendulum oscillates in two directions, [Formula: see text] and [Formula: see text], from which the mathematical model was derived and two torque components in oscillation directions were introduced. They are estimated using stabilometric data acquired by a foot pressure mapping system. The model was quantitatively investigated using data from 19 participants, who were first were classified into three groups, according to the foot arch-index. Stabilometric data were then collected and fed into the model to estimate the torque’s components. The components were statistically proce

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Water Treatment Using Zinc Nanoparticles and Apricot Plant Extracts from Organic and Inorganic Pollution
...Show More Authors

 

The apricot plant was washed, dried, and powdered after harvesting to produce a fine powder that was used in water treatment. created an alcoholic extract from the apricot plant using ethanol, which was then analysed using GC-MS, Fourier transform infrared spectroscopy, and ultraviolet-visible spectroscopy to identify the active components. Zinc nanoparticles were created using an alcoholic extract. FTIR, UV-Vis, SEM, EDX, and TEM are used to characterize zinc nanoparticles. Using a continuous processing procedure, zinc nanoparticles with apricot extract and powder were employed to clean polluted water. Firstly, 2 g of zinc nanoparticles were used with 20 ml of polluted water, and the results were Tetra 44% and Levo 32%; after

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
isolation and identification of cloves oil from eugenia caryophyllaa using Ultrasonic
...Show More Authors

This research has been prepared to isolate and diagnose one of the most important vegetable oils from the plant medical clove is the famous with Alaeugenol oil and used in many pharmaceuticals were the isolation process using a technique ultrasonic extraction and distillation technology simple

View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Poisson Regression and Conway Maxwell Poisson Models Using Simulation
...Show More Authors

Regression models are one of the most important models used in modern studies, especially research and health studies because of the important results they achieve. Two regression models were used: Poisson Regression Model and Conway-Max Well-  Poisson), where this study aimed to make a comparison between the two models and choose the best one between them using the simulation method and at different sample sizes (n = 25,50,100) and with repetitions (r = 1000). The Matlab program was adopted.) to conduct a simulation experiment, where the results showed the superiority of the Poisson model through the mean square error criterion (MSE) and also through the Akaiki criterion (AIC) for the same distribution.

Paper type:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
DESIGN AND IMPLEMENTATION AN IRAQI CITIES DATABASE USING K-D TREE
...Show More Authors

This research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).

View Publication Preview PDF