Preferred Language
Articles
/
ABYLBYcBVTCNdQwC3C5A
A Fast Feature Extraction Algorithm for Image and Video Processing
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 01 2012
Journal Name
International Journal Of Geographical Information Science
Assessing similarity matching for possible integration of feature classifications of geospatial data from official and informal sources
...Show More Authors

View Publication
Scopus (65)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Internet Technology Letters,
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Jul 22 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Studying the Optimal Conditions for Extraction of Local Basil Seeds Gum.: Studying the Optimal Conditions for Extraction of Local Basil Seeds Gum.
...Show More Authors

This study aimed to determine the optimal conditions for extracting basil seed gum in addition to determine the chemical components of basil seeds. Additionally, the study aimed to investigate the effect of the mixing ratio of gum to ethanol when deposited on the basis of the gum yield which was1:1, 1:2, 1:3 (v/v) respectively. The best mixing ratio was one size of gum to two sizes of ethanol, which recorded the highest yield. Based on the earlier, the optimal conditions for extracting basil seed gum in different levels which included pH, temperature, mixing ratio seeds: water and the soaking duration were studied. The optimal conditions were: pH 8, temperature of 60°C, mixing ratio seeds: water 1:65 (w/v) and soaking duration of 30 min

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 13 2025
Journal Name
Academia Open
Deep Learning and Fusion Techniques for High-Precision Image Matting:
...Show More Authors

General Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Aro-the Scientific Journal Of Koya University
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
A Cognition Path Planning with a Nonlinear Controller Design for Wheeled Mobile Robot Based on an Intelligent Algorithm
...Show More Authors

This paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
A Real-Coded Genetic Algorithm with System Reduction and Restoration for Rapid and Reliable Power Flow Solution of Power Systems
...Show More Authors

The paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Iranian Journal Of Chemistry And Chemical Engineering
The Thermal Pre-processing Technique of the Bio-waste for Contaminated Water Treatment: Histological and Experimental Study
...Show More Authors

The current study suggested a thermal treatment as a necessary proactive step in improving the adsorption capacity of bio-waste for contaminants removal in wastewater. This approach was based on the experimental and histological investigation of biowaste pods shell. This investigation showed that these shells compose of parenchyma cells that store secondary metabolites compounds produced from cells were exhibited in present study. The results also reported that these compounds are extracted directly from the cells as soon as they are exposed to an aqueous solution, hampering their use as an adsorbent material. The increase in the weight of bio-waste adsorbent at unit liquid volume increases the production of secondary metabolites compounds

... Show More
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (21)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More