Preferred Language
Articles
/
HhYxlocBVTCNdQwCCFco
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Classification of Diseases in Oil Palm Leaves Using the GoogLeNet Model
...Show More Authors

The general health of palm trees, encompassing the roots, stems, and leaves, significantly impacts palm oil production, therefore, meticulous attention is needed to achieve optimal yield. One of the challenges encountered in sustaining productive crops is the prevalence of pests and diseases afflicting oil palm plants. These diseases can detrimentally influence growth and development, leading to decreased productivity. Oil palm productivity is closely related to the conditions of its leaves, which play a vital role in photosynthesis. This research employed a comprehensive dataset of 1,230 images, consisting of 410 showing leaves, another 410 depicting bagworm infestations, and an additional 410 displaying caterpillar infestations. Furthe

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Magnetic Resonance Imaging
Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images
...Show More Authors

Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images

View Publication
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Lineament automatic extraction analysis for Galal Badra river basin using Landsat 8 satellite image
...Show More Authors

This research including lineament automated extraction by using PCI Geomatica program, depending on satellite image and lineament analysis by using GIS program. Analysis included density analysis, length density analysis and intersection density analysis. When calculate the slope map for the study area, found the relationship between the slope and lineament density.
The lineament density increases in the regions that have high values for the slope, show that lineament play an important role in the classification process as it isolates the class for the other were observed in Iranian territory, clearly, also show that one of the lineament hit shoulders of Galal Badra dam and the surrounding areas dam. So should take into consideration

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Mon Sep 11 2017
Journal Name
Journal Of Mathematical Imaging And Vision
Fast Recursive Computation of Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (46)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Fast discrimination of fake video manipulation
...Show More Authors

<span>Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2007
Journal Name
2007 Ieee International Conference On Signal Processing And Communications
Fast Multi-level Image Vector Quantization
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Aip Conference Proceedings
Classification of oral cavity cancer using linear discriminant analysis (LDA) and principal component analysis (PCA)
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
On The Convergence Speediness of K * and D-Iterations
...Show More Authors
Abstract<p>In this article, we introduced a new concept of mappings called δZA - Quasi contractive mapping and we study the K*- iteration process for approximation of fixed points, and we proved that this iteration process is faster than the existing leading iteration processes like Noor iteration process, CR -iteration process, SP and Karahan Two- step iteration process for 𝛿𝒵𝒜 − quasi contraction mappings. We supported our analytic proof by a numerical example.</p>
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication