Preferred Language
Articles
/
uBeVNY8BVTCNdQwCT2F7
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Engineering, Ije Transactions B: Applications
Adaptive Polynomial Coding of Multi-Base Hybrid Compression
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Adaptive inter frame compression using image segmented technique
...Show More Authors

The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.

           Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adaptive Canny Algorithm Using Fast Otsu Multithresholding Method
...Show More Authors

   In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm.      The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.  
 

View Publication Preview PDF
Publication Date
Wed Jan 10 2018
Journal Name
International Journal Of Science And Research (ijsr)
Results for Fuzzy Casual Stringy Differential Dissimilarity
...Show More Authors

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
First Order Nonlinear Neutral Delay Differential Equations
...Show More Authors

The author obtain results on the asymptotic behavior of the nonoscillatory solutions of first order nonlinear neutral differential equations. Keywords. Neutral differential equations, Oscillatory and Nonoscillatory solutions.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Hydrogen Energy
Modeling of electrocatalytic hydrogen evolution via high voltage alkaline electrolyzer with different nano-electrocatalysts
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Luxury in jewelry design
...Show More Authors

The current research dealt with the presence of ornaments and jewelry since ancient times، which express the social، religious or emotional status of the person who adorns them، in addition to being distinguished by a distinct aesthetic and luxury، that is، in a sense closely related to the social and economic status of people، and we note that jewelry is considered a symbol of luxury and luxury، and hence The need to study luxury appeared in the design of ornaments and jewelry because it refers to the adornment elements that are made of metals and precious stones، which actually indicate signs of status or position that distinguish social classes from each other. The problem was identified by the following question: Determine th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (63)
Crossref (55)
Scopus Clarivate Crossref
Publication Date
Mon Jun 16 2025
Journal Name
Al–bahith Al–a'alami
the Mission of the Iraqi E-press in crystalizing Public Orientation of Baghdad Towards Local Political Issues.
...Show More Authors

This dissertation explores the role of Iraqi E-press in crystallizing the orientations or directions of the public towards the local political issues like (demonstrations, parliamentarian elections, provincial elections, the public budget and its consequences, Iraq’s relations with neighboring countries, Iraqi HOR and its sessions, and the relation of the federal government with KRG). The dissertation’s main problem revolves around a central inquiry: what is the role of the Iraqi E-press in crystalizing the direction of the Iraqi public towards the local political issues?
The dissertation included a number of assumptions; the first assumes the relation of demographic variants (gender, age, social status, education, working status

... Show More
View Publication Preview PDF
Crossref