Preferred Language
Articles
/
JBYRU4cBVTCNdQwC1UXb
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performance measures are used as a criterion to decide which classifier is the best one to detect the images with high accuracy. Eventually, the simulation results show that each classifier detect the damage/no damage image with different performance measures and then makes it easy to select the best one.

Scopus Crossref
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Dec 30 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Retrofitting of Reinforced Concrete Damaged Short Column Exposed to High Temperature
...Show More Authors

Experimental research was carried out to investigate the performance of CFRP wrapping jackets used for retrofitting twelve square reinforced concrete (CR) column specimens damaged by exposure to fire flame, at different temperatures of  300, 500 and 700ºC, except for two specimens that were not burned. The specimens were then loaded axially till failure after gradual or sudden cooling. The specimens were divided into two groups containing two main reinforcement ratios, ρ= 0.0314 and ρ= 0.0542. This was followed by the retrofitting procedure that included wrapping all the specimens with two layers of CFRP fabric sheets. The test results of the retrofitted specimens showed that the fire damaged RC

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Response of Damaged Reinforced Concrete Beams Strengthened with NSM CFRP Strips
...Show More Authors

This paper presents a study (experimentally) for strengthening reinforced concrete (RC) beams with Near-Surface-Mounted (NSM) technique. The use of this technique with CFRP strips or rebars is an efficient technology for increasing the strength for flexure and shear or for repairing damaged reinforced concrete (RC) members. The objective of this research is to study, experimentally, RC beams either repaired or strengthened with NSM CFRP strips and follow their flexural behavior and failure modes. NSM-CFRP strips were used to strengthen three RC beam specimens, one of them was initially strengthened and tested up to failure. Four beam specimens have been initially subjected to preloading to 50% and 80% of ultimate load. Two of the sp

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Retrofitting Reinforced Concrete One–Way Damaged Slabs Exposed to High Temperature
...Show More Authors

Exposure of reinforced concrete buildings to an accidental fire may result in cracking and loss in the bearing capacity of their major components, columns, beams, and slabs. It is a challenge for structural engineers to develop efficient retrofitting techniques that enable RC slabs to restore their structural integrity, after being exposed to intense fires for a long period of time. Experimental
investigation was carried out on twenty one slab specimens made of self compacting concrete, eighteen of them are retrofitted with CFRP sheets after burning and loading till failure while three of them (which represent control specimens) are retrofitted with CFRP sheet after loading till failure without burning. All slabs had been tested in a

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Physics: Conference Series
Studies on The Effect of Temperature on The Charge Transfer Reaction Rate of N3 Dye When Contacted With Zinc Sulfide Semiconductor
...Show More Authors
Abstract<p>In this paper, the effect of temperature on the charge transfer rate of dye (N3) in contact with ZnS semiconductors is discussed and studied when electrons move from the excited N3 dye to the conduction band of ZnS based on quantum shift theory. In a heterogeneous system, the energy levels are assumed to be continuous, and the N3-ZnS system is surrounded by a variety of polar solvent media. The transition energy of the N3/ZnS heterojunction was calculated using seven different solvents at room temperature, considering the refractive index and dielectric constant of the solvents and the ZnS semiconductor, respectively. The charge-transport reaction rate was calculated over different te</p> ... Show More
View Publication
Scopus Crossref