Preferred Language
Articles
/
wxf7L48BVTCNdQwC8l7G
Correlated Hierarchical Autoregressive Models Image Compression
...Show More Authors

Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Image Denoising Using Multiwavelet Transform with Different Filters and Rules
...Show More Authors

<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt&amp; pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Aug 20 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Autogenous Onlay Graft with Compression Plate for Treatment of Persistent Humeral Shaft Aseptic Non-union with Failed Previous Surgery
...Show More Authors

BACKGROUND: The humeral shaft fractures have a good rate of union, despite this fact, still there is a significant rate of nonunion after nonoperative treatment and more often after operative treatment. AIM: The aim of the study is to evaluate the autogenous onlay graft with compression plate for treatment of persistent humeral shaft non-union with failed previous surgery both radiological and functional outcome. MATERIALS AND METHODS: A prospective study on twenty patients having persistent aseptic non-union age between 20 and 60 years old, after failed surgical treatment of fractures humeral shaft in Al-Zahra teaching and Al-Kindy teaching hospitals, while infected nonunion, diabetes mellitus, secondary metastasis, smoking, a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
College Of Islamic Sciences
The position of women In Literary Literature Models of the Arabic and Kurdish literature
...Show More Authors

This research deals with the topic (the position of women) in the literature literature, and the researcher cites a bouquet of woolen yarn, examples of verses and poems from this fine literature that looks at the woman with respect and appreciation. In their poems.
The research is a comparative search for Arab and Kurdish literature, by selecting six famous poets in the literature, three of them are from Arabic literature, and the other three are from Kurdish literature, and thus the research is divided into two subjects and six demands.
Finally, the researcher tried to set a brick that would be an entry point to find an indicative explanation and a suitable explanation that would break those symbols and signs that caused the exp

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 22 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Developing models to predicting the effect of crises on construction projects using MLR technique
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Some of Robust the Non-Parametric Methods for Semi-Parametric Regression Models Estimation
...Show More Authors

In this research, some robust non-parametric methods were used to estimate the semi-parametric regression model, and then  these methods were compared using the MSE comparison criterion, different sample sizes, levels of variance, pollution rates, and three different models were used. These methods are S-LLS S-Estimation -local smoothing, (M-LLS)M- Estimation -local smoothing, (S-NW) S-Estimation-NadaryaWatson Smoothing, and (M-NW) M-Estimation-Nadarya-Watson Smoothing.

The results in the first model proved that the (S-LLS) method was the best in the case of large sample sizes, and small sample sizes showed that the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology &amp; Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Mobility Models over UDP Traffic Pattern for MANET Using NS-2
...Show More Authors

  The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes,  different traffic rates, different traffic sources, different pause times and different simulation times .  A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 23 2026
Journal Name
Imam Ja&#39;afar Al-sadiq University Journal Of Legal Studies
The role of fluctuations and crises in stock markets in activating market makers models
...Show More Authors

View Publication