Preferred Language
Articles
/
AhYHYocBVTCNdQwCwUkJ
Sprite Region Allocation Using Fast Static Sprite Area Detection Algorithm
...Show More Authors

Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to restore the artifacts happened in the binary map. Results: The tests results specified that the proposed method is a fast static sprite area detection algorithm that leads quickly to remarkable sprite location. Conclusion: It is found that the proposed strategies can allocate the sprite (survive) areas easily and in appropriate way and distinguish static sprite region which demonstrate survived region.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Investigation of Groundwater and The Impact of Over-Pumping in Al-Haydariyah Region, Iraq
...Show More Authors

In this study; a three-dimensional model was created to simulate groundwater in Al-Haydariyah area of the governorate of Al-Najaf. A solid model was created to utilize the cross sections of 25 boreholes in the research region, and it was made out of two layers: sand and clay. The steady-state calibration was employed in six observation wells to calibrate the model and establish the hydraulic conductivity, which was 17.49 m/d for sand and 1.042 m/d for clay, with a recharge rate of 0.00007 m/day. The wells in the research region were reallocated with a distance of 1500 m between each well, resulting in 140 wells evenly distributed throughout the study area and with a discharge of 5 l/s, and the scenarios were run for 1000

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Domestic Violence and Extremism among the Young: A Field Study in the Madain Region
...Show More Authors

Young people represent the power and cornerstone of societies and their superiority is linked to their well-being. Their empowerment is as essential as the heart to the body, if it is corrupt, then the whole body is corrupt, and vice versa. The exposure to extremism and pressure from their families leads to violent acts and crimes for obtaining money through unknown organized bodies. This will drive them to fail in their life in an attempt to fulfill their most basic needs, which they have been deprived of by their families, the government, and other institutions. Therefore, governments should provide job opportunities for young people and provide entertainment centers, sports clubs, and family education centers that raise awareness of s

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
(Structure Logistic Regression Model Of Anomalies Birth In Iraq Except Kurdistan Region, for 2015)
...Show More Authors

Congenital anomalies commonly occur in humans, possibly visible. If these anomalies appear in visible parts in human body such as face, hands and feet. They may only appear after utilizing a number of special tests in order to show by means of the anomalies that occur in the internal organs of the body such as heart, stomach and kidneys.

    Research data have comprised accessible information in the anomalies birth statistics form situated of Health and Life Statistics section at the Ministry of Health and environment, where the number of anomalies births involved in the study (2603 anomalies birth) in Iraq, except Kurdistan region, at 2015. A two way-response logistic regression analysis h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 25 2023
Journal Name
Iraqi Journal Of Agricultural Sciences
BREEDING POTENTIAL OF RICE GENOTYPES IN TWO AGROCLIMATIC CONDITIONS OF SULAIMANI - KURDISTAN REGION - IRAQ
...Show More Authors

This study was aimed to investigate the genetic variability of 26 rice genotypes and evaluation at two locations in Sulaimani governorate, Gaba and Chawtan which were completely different in their environmental condition during the season of 2019. The performances of the genotypes were analyzed at both locations as well as the average of both. Simple coefficients of correlation were used to assess the grain yield components and their relationships. Path analysis was used to determine the direct and indirect effects of such components on grain yield plant-1. The genotypes were grouped based on the agro-morphological features using cluster analysis. Almost all of the traits at both locat

... Show More
View Publication Preview PDF