Preferred Language
Articles
/
Ghj7dZQBVTCNdQwC2hmN
Frame-Based Change Detection Using Histogram and Threshold to Separate Moving Objects from Dynamic Background
...Show More Authors

      Detecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Stability and Dynamic Analysis of Laminated Composite Plates
...Show More Authors

Buckling and free vibration analysis of laminated rectangular plates with uniform and non uniform distributed in-plane compressive loadings along two opposite edges is performed using the Ritz method. Classical laminated plate theory is adopted. The static component of the applied in- plane loading are assumed to vary according to uniform, parabolic or linear distributions. Initially, the plate membrane problem is solved using the Ritz method; subsequently, using Hamilton’s variational principle, linear homogeneous algebraic equations in terms of unknown are generated, the set of linear algebraic equations can be solved as an Eigen-value problem. Buckling loads for laminated plates with different combinations of bounda

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Structures
The effect of ground motion characteristics on the fragility analysis of reinforced concrete frame buildings in Australia
...Show More Authors

View Publication
Crossref (15)
Crossref
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
Detection of CTX-M-type ESBLs from Escherichia coli Clinical Isolates from a Tertiary Hospital, Malaysia
...Show More Authors

The present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%).  After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Detection of interleukin-6 and interleukin-8 in serum from women with recurrent spontaneous abortion
...Show More Authors

To investigate the role of IL-6 and IL-8 in the immune-regulatory mechanisms involved in the recurrent spontaneous abortion of the first trimester of pregnancy. Serum level of IL-6 and IL-8 were determined in 25 women of age (20-35) years who had a spontaneous abortion of unknown aetiology during the first trimester of pregnancy .They were compared with the corresponding levels of 20 pregnant and non-pregnant women as control groups .cytokine levels were measured by (ELISA) technique .The women with spontaneous abortion had highly significant (P < 0.01) increased serum level of IL-8 and highly significant (P < 0.01 ) decreased level of IL-6 compared to those with normal pregnant and non-pregnant women. The results of this study ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sat Jun 15 2024
Journal Name
Iraqi Journal Of Laser
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (64)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2017
Journal Name
International Journal Of Science And Research (ijsr)
Detection System of Varicose Disease using Probabilistic Neural Network
...Show More Authors