Preferred Language
Articles
/
JBYRU4cBVTCNdQwC1UXb
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performance measures are used as a criterion to decide which classifier is the best one to detect the images with high accuracy. Eventually, the simulation results show that each classifier detect the damage/no damage image with different performance measures and then makes it easy to select the best one.

Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences 318, 03006 (2021)
Effect of External Post-Tensioning Strengthening Technique on Flexural Capacity of Simple Supported Composite Castellated Beam
...Show More Authors

This research is carried out to study the effect of the external post-tensioning technique on the flexural capacity of simply supported composite castellated beam experimentally. In this research, seven composite castellated beams having the same dimensions and material properties were cast and tested up to failure by applied two concentrated loads at 700 mm from each end. Two external strands of 12.7 mm diameter were fixed at each side of the web of strengthening beams and located at depth 180 mm from top fiber of the section (dps) at each end of the beam. The strands have been tensioned by using a hydraulic jack with a constant stress of 100 MPa. This research aims to study the effect of the strengthening by different shapes of st

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Relaxation on Symptoms of Post-Traumatic Stress Disorder (PTSD) among displaced Yazidi Women
...Show More Authors

The study aims to identify the symptoms of PTSD among displaced Yazidi women according to age, marital status, educational level, and type of status (displaced or survivor). The study also seeks to identify the effect of the relaxation program on reducing PTSD among displaced Yazidi women. The research sample included (60) Yazidis for the statistical analysis sample and (5) for the experimental sample in the Dohuk governorate. For achieving the research objectives, a scale was used from the PTSD Checklist for DSM-5 (PCL-5), as well as a relaxation program was prepared. The researchers reached the following results that there is an average level of PTSD symptoms among displaced Yazidi women, there are no statistically significant differen

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effects of vitamin D deficiency on bone and root re-sorption post-orthodontic retention in rats
...Show More Authors

Background: Orthodontic therapy often causes external root resorption. Serum vitamin D (VD) level is important for tooth mineralization and bone remodeling. This study aimed to test the impact of vitamin D (VD) supplements on bone and root remodelling in a vitamin D (VD) deficient rat model following orthodontic retention. Methods and Material: 30 male Wistar rats were divided into three groups: a control group of 10 rats and two experimental groups of 10 rats each with vitamin D deficiency (VDD) induced by a VD-free diet for 21 days. And a third group with VD supplementAll groups received orthodontic active treatment using a modified orthodontic appliance that applied 50 gm of force for 14 days to move the maxillary right first mol

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (23)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (3)
Crossref