Preferred Language
Articles
/
uhc6WZABVTCNdQwCHIfk
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Concept And Importance Of Detection Failureś Possibilities Of Corporation Proposed Model For Application In The Iraqi Environment
...Show More Authors

Research aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting  a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a  number of academics professionals experts, in addition to  financial analysts  and have concluded a set of conclusions ,  the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Physical Education
Building and rationing test to measure the kinetic response to the movement of the player defender basketball junior time
...Show More Authors

The researchers believe the problem of searching the scarcity or limited tests of time kinetic response led to scarcity or limited availability of experimental research in exercises codified within the training curriculum for the junior class, and therefore has been weakening this physical variable as an important episode in the development of the players physical capacities as well as the lack of measure for this variable within the defensive skills in general and the skill of the player movement defender in particular, and it represents the goal of research in the treatment of the above through the construction and rationing test to measure the kinetic response to the movement of the player defender basketball junior time. Chosen as the r

... Show More
Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Environmental Technology & Innovation
Extraction of glycyrrhizin from licorice (Glycyrrhiza Glabra L.) by bulk liquid membrane
...Show More Authors

In this work, the extraction of glycyrrhizin from Licorice using bulk liquid membrane technique was developed and optimized. The effect of various parameters such as pH of stripping and donor solutions, temperature, stirring speed and kinetic parameters were investigated. Moreover, to study the impact of the polarity of membrane solvent, two types of extraction solvents were used as a membrane solvent: n-Hexane was used as a non-polar solvent and 1-Hexanol was as a polar solvent. The optimum extraction condition was found (95.53%) using 1-Hexanol, rotating speed was 400 rpm, and pH of the acceptor and donor solutions were 8 and 5.5, respectively. The reaction kinetics constants ( and ) for the transport of glycyrrhizin from the donor pha

... Show More
View Publication
Scopus (18)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Myoelectric feature extraction using temporal-spatial descriptors for multifunction prosthetic hand control
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction
...Show More Authors

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Artificial Intelligence
Recursive Multi-Signal Temporal Fusions With Attention Mechanism Improves EMG Feature Extraction
...Show More Authors

View Publication
Scopus (38)
Crossref (35)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Essential Oils from Citrus By-Products Using Microwave Steam Distillation
...Show More Authors

The main objectives of this research is to extract essential oil from: orange ( citrus sinensis), lemon( citrus limon) and mandarin( citrus reticulata) peels by two methods: steam distillation (SD) and microwave assisted steam distillation (MASD), study the effect of extraction conditions (weight of the sample, extraction time, and microwave power, citrus peel type) on oil yield and compare the results of the two methods, the resulting essential oil was analyzed by Gas Chromatography (GC).

   Essential oils are highly concentrated substances used for their flavor and therapeutic or odoriferous properties, in a wide selection of products such as foods, medicines and cosmetics. Extracti

... Show More
View Publication Preview PDF