Preferred Language
Articles
/
0RidoJcBVTCNdQwCjJln
Classification of Apple Slices Treated by Atmospheric Plasma Jet for Post-harvest Processes Using Image Processing and Convolutional Neural Networks
...Show More Authors
Abstract<p>Apple slice grading is useful in post-harvest operations for sorting, grading, packaging, labeling, processing, storage, transportation, and meeting market demand and consumer preferences. Proper grading of apple slices can help ensure the quality, safety, and marketability of the final products, contributing to the post-harvest operations of the overall success of the apple industry. The article aims to create a convolutional neural network (CNN) model to classify images of apple slices after immersing them in atmospheric plasma at two different pressures (1 and 5 atm) and two different immersion times (3 and again 6 min) once and in filtered water based on the hardness of the slices using the k-Nearest Neighbors (KNN), Tree, Support Vector Machine (SVM), and Artificial Neural Network (ANN) algorithms. The results showed an inverse relationship between the storage period and the hardness of the apple slices, with the average hardness values gradually decreasing from 4.33 (day 1) to 3.37 (day 5). Treatment with atmospheric plasma at a pressure of 5 atm and an immersion time of 3 min gave the best results for maintaining the hardness of the slices during the storage period, recording values of 4.85 (first day) and 3.68 (fifth day), outperforming other treatments. The average improvement rate was 23.09% over five consecutive days. Regarding the CNN algorithms, the ANN algorithm achieved the highest classification accuracy of 97%, while the Tree algorithm achieved the lowest accuracy of 88.7%. The KNN and SVM algorithms achieved classification accuracies of 94.7% and 95.1%, respectively. The study demonstrated the possibility of using a CNN to classify apple slices based on the degree of hardness. Furthermore, the application of atmospheric plasma at 5 atmospheres with a 3-min immersion improves the firmness of the apple slices by inhibiting degradative enzymes while preserving the cellular structure and tissue quality.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Mon Jan 01 2007
Journal Name
2007 Ieee International Conference On Signal Processing And Communications
Fast Multi-level Image Vector Quantization
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Tue Jun 16 2020
Journal Name
Frontiers In Pharmacology
Administration of Δ9‐Tetrahydrocannabinol (THC) Post‐Staphylococcal Enterotoxin B Exposure Protects Mice From Acute Respiratory Distress Syndrome and Toxicity
...Show More Authors

View Publication Preview PDF
Scopus (26)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 03 2010
Journal Name
Journal Of Educational And Psychological Researches
Post Traumatic Stress Disorder (PTSD) among Iraqi Intellectual Immigrants after Occupation 2003.
...Show More Authors

These factors, as well as disasters and wars that the Arab homeland exposed to and still under this exposure, in addition to the severe stress upon.

Iraqi Academics have been subjected to direct consequences of 2003 war. Exact figures are not known. It was mentioned. Many people were killed, sacked from their academics jobs, threatened to leave directly or indirectly their jobs, houses, and Iraq. Others have been imprisoned, tortured, or kidnapped / threatened to be kidnapped etc. Their families have been subjected to similar traumatic experiences or threats. All theses stressors may have lead to Post Traumatic (PTSD) Experiences. These Traumatic experiences have lead to Dislocation, relocation and Immigration etc. All sectors of

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenography space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors

Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenographic space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors

View Publication
Crossref