Search Results - "2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)"

Refine Results
  1. 1

    Face Direction Estimation based on Mediapipe Landmarks by Al-Nuimi, Arqam M., Mohammed, Ghassan J.

    “…Many studies had been presented to estimate face direction that relied on training images. A small portion of these studies relied on mathematical calculations…”
    Get full text
    Conference Proceeding
  2. 2

    Integration of Big Data, IoT and Cloud Computing by AlBazaz, Dhuha Basheer Abdullah

    “…Summary form only given. A record of the presentation was not made available for publication as part of the conference proceedings. We are entering into the…”
    Get full text
    Conference Proceeding
  3. 3

    Solving Abel's Integral Equation Using (Sadiq-Emad-Eman) Transform by Mansour, Eman A., Kuffi, Emad A., Mehdi, Sadiq A.

    “…In this paper, the exact solution of Abel's integral equation is found by using new integral transform named "SEE (Sadiq-Emad-Eman) integral". The capability…”
    Get full text
    Conference Proceeding
  4. 4

    Generating digital images of skin diseases based on deep learning by Ahmed, Hasan M., Kashmola, Manar Y.

    “…Data generation systems and architectures seek to create new and valuable data with specific sizes and characteristics which are similar to the original data…”
    Get full text
    Conference Proceeding
  5. 5

    Cohesive Summary Extraction From Multi-Document Based On Artificial Neural Network by Mohammed, Marwan B., Al-Hameed, Wafaa

    “…Increasing growth in the volume of digital data from documents performed the difficulty of accessing important information. The solution is using automatic…”
    Get full text
    Conference Proceeding
  6. 6

    Estimating the Rate of Occurrence of Geometric Process With Exponential Distribution by Idrees, Noor Hani, Sulaiman, Muthanna Subhi

    “…Geometric process (GP) is an important alternative to the Non homogeneous Poisson process (NHPP), in which arrival time is modeled with the trend, in this…”
    Get full text
    Conference Proceeding
  7. 7

    A Review on Image Processing Based Neonatal Jaundice Detection Techniques by Hashim, Warqaa, Alkhaled, Makram, Al-Naji, Ali, Al-Rayahi, Izzat

    “…Jaundice or Hyperbilirubinemia is a very common condition that affects newborns in their first few weeks of life. The main cause of jaundice is the high level…”
    Get full text
    Conference Proceeding
  8. 8

    Enhancement of Daytime Crescent Image Using Wiener Filter Based De-Blurring Technique by Ali, Rand Hussam, Khidhir, Abdul Sattar M.

    “…The aim of this research is to enhance the astronomical image, specifically the crescent image. Millions of Muslims care of monitoring the new crescent to…”
    Get full text
    Conference Proceeding
  9. 9

    Real-Time Routing for Internet of Things: A Survey on Techniques and Protocols by Abdullah, Dhuha Basheer, Salih, Mohammed Tariq

    “…The Internet of Things (IoT) is a wireless network consisting of interconnected objects. Lately, IoT has become the inevitable future for most if not all…”
    Get full text
    Conference Proceeding
  10. 10

    Analytical Treatment to Find Stability of the System of Partial Equations Arising from Heat Transfer on A porous Plate by Jumaa, Ahmed Muhammed

    “…This paper presents the analytical solution for a mathematical model of heat transfer by free convection which arises from the flowing of fluid on a porous…”
    Get full text
    Conference Proceeding
  11. 11

    A quantitative spatial Risk Measure for Extreme Events by Hashm, Wasnaa, Ahmed, Manaf Hazim

    “…The environmental or climatic change events are often represented by the spatial data, as well as in extreme case. So, taking into account the spatial features…”
    Get full text
    Conference Proceeding
  12. 12

    Deep Radial Basis Function Networks by Alqezweeni, Mohie M., Gorbachenko, Vladimir I., Stenkin, Dmitry A.

    “…The use of radial basis functions networks as physics-informed neural networks for solving direct and inverse boundary value problems is demonstrated. On the…”
    Get full text
    Conference Proceeding
  13. 13

    Face Identification Under Disguise and Makeup Based on Hybrid Deep Learning by Al-Ghanim, Farah Jawad, Al-Juboori, Ali mohsin

    “…Facial recognition has been broadly used in advanced intelligent systems (i.e: smart video surveillance, intelligent access control system, and online…”
    Get full text
    Conference Proceeding
  14. 14

    IoT Application-Specific for Supervising and Enquiring Industrial Devices by Alwash, Nahedh Hasoon, Abdullah, Ali Najim, Jawad, Ali Talib, Ali, Noor S.

    “…The development of industrial infrastructure is considered the main requirement to grow the countries' economies. This development comes by making industrial…”
    Get full text
    Conference Proceeding
  15. 15

    Detection of Spliced Images in Social Media Application by Jabaar, Munera A., Alsaad, Saad N.

    “…Social media in the current technological era plays a major role in people's daily lives. Every day hundreds of thousands of images are circulated on social…”
    Get full text
    Conference Proceeding
  16. 16

    Solving Abel's Integral Equation Using (Sadiq-Emad-Eman) Transform by Mansour, Eman A., Kuffi, Emad A., Mehdi, Sadiq A.

    “…In this paper, the exact solution of Abel's integral equation is found by using new integral transform named "SEE (Sadiq-Emad-Eman) integral". The capability…”
    Get full text
    Conference Proceeding
  17. 17

    Credit Card Fraud Detection in Financial Transactions Using Data Mining Techniques by Alwan, Raghad Hussien, Hamad, Murtadha M., Dawood, Omar A.

    “…Every year, fraudulent credit card transactions result in the loss of billions of dollars. The development of effective fraud detection algorithms is critical…”
    Get full text
    Conference Proceeding
  18. 18

    An Improvement on Leach Protocol for Wireless Sensor Network by Hasson, Saad Talib, Hasan, Salar Essa

    “…This paper clarifies the implementation of the leach protocol in wireless sensor networks (WSN) and developing an enhanced approach to select the cluster head…”
    Get full text
    Conference Proceeding
  19. 19

    Contagious Patient Tracking Application Spotlight: Privacy and Security Rights by Fares, Alaa, Alanezi, Mafaz

    “…As the Covid-19 outbreak spreads across the globe and has killed many lives, many applications have been created to track patients and fight this pandemic…”
    Get full text
    Conference Proceeding
  20. 20

    A Comparative Study of Algorithms of Software Effort Estimation for the Robotic and Communication Systems Based on Improved Accuracy by Salman, Emad Hmood, Zayer, Iman Ahmed, Hassan, Shayma Naif

    “…The engineering systems of robotics, communication networks, and electronics status, require a software effort estimation to decrease the error of effort and…”
    Get full text
    Conference Proceeding