Preferred Language
Articles
/
EBZzBYcBVTCNdQwCTy-h
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). Therefore, finding a fast PET classification method that accurately clas-sify image pattern is crucial. To this end, this paper proposes a new scheme for accurate and fast imagepattern classification using an efficient DOM. To reduce the computational complexity of feature extraction,an election mechanism is proposed to reduce the number of processed block patterns. In addition, supportvector machine is used to classify the extracted features for different block patterns. The proposed scheme isevaluated by comparing the accuracy of the proposed method with the accuracy achieved by state-of-the-artmethods. In addition, we compare the performance of the proposed method based on different DOMs toget the robust one. The results show that the proposed method achieves the highest classification accuracycompared with the existing methods in all the scenarios considered

Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Reliability Estimation for the Exponential Distribution Based on Monte Carlo Simulation
...Show More Authors

        This Research deals with estimation the reliability function for two-parameters Exponential distribution, using different estimation methods ; Maximum likelihood, Median-First Order Statistics, Ridge Regression, Modified Thompson-Type Shrinkage and Single Stage Shrinkage methods. Comparisons among the estimators were made using Monte Carlo Simulation based on statistical indicter mean squared error (MSE) conclude that the shrinkage method perform better than the other methods

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Field study of the effect of jet grouting parameters on strength based on tensile and unconfined compressive strength
...Show More Authors
Abstract<p>The improvement of the mechanical soil characteristics of jet grouting technique is very attractive. The jet grouted soil cement columns in soft is a complicated issue because it depends on a number of factors such as, soil nature, mixture, influence among soil and grouting materials, jetting force of nozzle, jet grouting and water flow rate, rotation and lifting speed. This paper discusses the estimation of shear strength parameters of soil-cement column (soilcrete) in soft clayey soil based on the relationships between the unconfined compressive and split tensile strength for the soilcrete and the effect of the jet grouting and water pressure in the values of cohesion and internal f</p> ... Show More
View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Mar 16 2022
Journal Name
International Journal Of Recent Contributions From Engineering, Science & It
Smart Learning based on Moodle E-learning Platform and Digital Skills for University Students
...Show More Authors

Publication Date
Thu Jun 18 2020
Journal Name
Biochem. Cell. Arch.
NEW DERIVATIVE OF CHITOSAN BASED ON EPICHLOROHYDRNE, SYNTHESIS, CHARACTERIZATION, ANTIBACTERIAL ACTIVITY AND SWELLING STUDY
...Show More Authors

A novel series of chitosan derivatives were synthesized via reaction of chitosan with carbonyl compounds and grafted it’s by with different amine compounds substituted hydrogen. The produced polymers were characterized by different analyses FTIR, 1HCNMR, XRD, DSC and TGA. Solubility in water as well as many solvent was investigated, antibacterial activity of chitosan and its derivatives against two types of bacteria E. coli and S. aureus was also investigated. The results showed that derivatives sort of have antibacterial activities against Esherichia coli (Gram negative) better than chitosan whilst compound IX has better antibacterial against Staphylococcus aureus (Gram positive). SEM analysis showed that increase of surface roughness wi

... Show More
Publication Date
Tue Jan 10 2017
Journal Name
International Journal Of Dynamics And Control
On local approximation-based adaptive control with applications to robotic manipulators and biped robots
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Root Cause Analysis And Improvement In Windows System Based On Windows Performance Toolkit WPT
...Show More Authors

       Performance issues could be appearing from anywhere in a computer system, finding the root cause of those issues is a troublesome issue due to the complexity of the modern systems and applications. Microsoft builds multiple mechanisms to make their engineers understand what is happening inside All Windows versions including Windows 10 Home and the behavior of any application working on it whether Microsoft services or even third-party applications, one of those mechanisms is the Event Tracing for Windows (ETW) which is the core of logging and tracing in Windows operating system to trace the internal events of the system and its applications. This study goes deep into internal process activities to investigat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 21 2023
Journal Name
International Journal Of Operational Research
Aggregate production planning of Abu Ghraib Dairy factories based on forecasting and goal programming
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More