Israa Abdulameer AbduljabbarUniversity of Technology, Iraq · Department of Computer Science
Israa Abdulameer Abduljabbar
Assist prof. Dr. in Computer Science Department
About
29
Publications
6,039
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
35
Citations
Introduction
Israa Abdulameer Abduljabbar currently works at the Department of Computer Sciences, University of Technology, Iraq.
Submit a Paper to the International Journal of Distributed Artificial Intelligence (IJDAI); _ ; https://www.igi-global.com/calls-for-papers/international-journal-distributed-artificial-intelligence/208696
Additional affiliations
December 2005 - May 2019
December 2005 - May 2019
Publications
Publications (29)
Writing ability is an important aspect of a child's growth. Mechanical engineering, electronic engineering, and computer science ideas are frequently used in the creation of a writing robotic arm (particularly artificial intelligence). This paper presented a comparative study between our two previous works: Artificial Neural Network (ANN) and Adapt...
Scheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetabl...
This paper present a hybrid technique between two of the most popular face recognition methods, Principal Component Analysis (PCA) and singular value decomposition (SVD), and attempts to offer a study for all its mathematical equations in detail and concentrate on the hybrid place between equations in order to focus on the way of processing the hyb...
This paper produces a proposed watermarking system to be used for protecting images from tampering by attackers and other third parties. This proposed system consists of three stages: pattern generation, watermark embedding and watermarking extracting. In the first stage, two patterns (primary and secondary) are generated from some features of the...
This paper presents a watermarking protocol that is used for protecting any digital image and working as a copyright registration for any important image to any user who feels his/her image is important. The registration by this server is applied only once for any input image by keeping the date and the time of the registration with secure authenti...
This paper uses hybrid techniques to improve the rate of recognition for a face from identified data set of faces. These techniques are summarized by applying firstly the Haar discrete wavelet transformation method in order to enhance and compress the images of the data set and store the results for each process in a separate data set. Secondly, ap...
This paper presents hybrid technique using two metahueristic methods; which are simulated annealing (SA) and tabu search (TS). The aim is to exhibit the facility of adaptive memory in tabu search method to resolve the long computation times of simulated annealing metaheuristic method. This can be done by keeping the best path which is found in each...
This paper presents hybrid technique using two metahueristic methods; which are simulated annealing (SA) and tabu search (TS). The aim is to exhibit the facility of adaptive memory in tabu search method to resolve the long computation times of simulated annealing metaheuristic method. This can be done by keeping the best path which is found in each...
This work abstractly proposed a method to Protect the owner copyright by adding invisible watermark to image using Genetic Algorithm
This paper discuss one of the most popular face recognition statistical method, Principal Component Analysis (PCA), and attempts to display an exhaustive study for all its mathematical operations in detail and highlighted point of view on using matrix multiplication and dot product in mathematical equations of principle component and testing two ty...
This paper presents a proposed watermarking technique used for protecting images from tampering by the attackers and other third parties. This technique is consisting of three stages: pattern generation, watermark embedding and watermarking extracting. In proposed work, two patterns (primary and secondary) are generated from some features of the im...
Image matching using feature extraction is an important issue in computer vision tasks. The main drawback of matching process is the bottleneck problem that rapidly appeared when the number of features increased. This paper produced an adaptive approach to improve Scale Invariant Feature Transform (SIFT) matching. The main idea is to increase the n...
Abstract – This paper aims to enhance the recognition rate in some Gabor face recognition techniques; the enhancement is done using two filtering stages. the first stage consists of applying adapted wavelet de-noising filter on the face database, this adaptive filter is composed of two filters (Bior 1.1 and Daubachies6) which are implemented succes...
This paper presents a watermarking protocol that is used for protecting any digital image
and working as a copyright registration for any important image to any user who feels his/her
image is important. The registration by this server is applied only once for any input image by
keeping the date and the time of the registration with secure authenti...
In this paper, the impact of face image pre-processing in rising the face recognition rate is presented, considering the face images with low contrast, bad or dark lighting. Three preprocessing steps including image adjustment, histogram equalization and image conversion to Joint Photographic Experts Group (JPEG) or (JPG) and Bitmap (BMP) are used...
Face recognition has an important research area
in the computer vision and pattern recognition systems. Principal
Component Analysis (PCA) is one of the most popular
representation methods for face recognition. PCA has limitations
such as discriminatory power poverty and the computational
load complexity. Due to these limitations of the existing PC...
This paper presents a novel human face
identification approach. This approach consists of three parts:
de-noised face database, Adaptive Principle Component
Analysis based on Wavelet Transform (APCAWT), and the
Scale Invariant Feature Transform approach, (SIFT). The
main idea is to extend SIFT features by using a APCAWT on
compressed and de-noised...
This paper presents a novel human face identification approach. This approach consists of three parts: de-noised face database, Adaptive Principle Component Analysis based on Wavelet Transform (APCAWT), and the Scale Invariant Feature Transform approach, (SIFT). The main idea is to extend SIFT features by using a APCAWT on compressed and de-noised...
In this paper, two adaptive image enhancement and de-noising chains are produced. Our aim is to enhance the face image quality that stored in a large database for face recognition applications. Each processing chain consists of three steps, the first chain is proposed to enhance Principal Component Analysis (PCA) and Kernel Principal Component Anal...
There are numerous of Artificial Intelligence (AI) search strategies that used for finding the solution path to a specific problem, but many of them produce one solution path with no attention if it is the optimal path or not. The aim of our work is to achieve the optimality by finding direct path from the start node to the goal node such that it i...
In this paper a comparison between face recognition rate with noise and face recognition rate without noise is presented. In our work we assume that all the images in the ORL faces database are noisy images. We applied the wavelet based image de-noising methods to this database and created new databases, then the face recognition rate are calculate...
There are numerous search methods in A.I used to find the solution path to a subjected problem, but many of them return one solution path with no consider it is the optimal or not. The aim of this work is to find a direct path from the start state to the goal state such that it is the shortest path with minimum cost (the optimal solution path). We...
There are numerous search methods in A.I used to find the solution path to a subjected problem, but many of them return one solution path with no consider it is the optimal or not. The aim of this work is to find a direct path from the start state to the goal state such that it is the shortest path with minimum cost (the optimal solution path). We...
The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore, the need to protect the mobile information appeared against the changing and the mis...
Questions
Questions (3)