Preferred Language
Articles
/
KBcJOY8BVTCNdQwCO2T9
Groupwise Non-Rigid Image Alignment Using Few Parameters
...Show More Authors

Groupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is efficient, has very few free parameters to tune, and the authors show how to tune the few remaining parameters. Results show that the method reliably aligns various datasets including two facial datasets and two medical datasets of prostate and brain MRI images and demonstrates efficiency in terms of performance and a reduction of the computational cost.

View Publication
Publication Date
Thu Jun 01 2017
Journal Name
Iosr Journal Of Computer Engineering
Lossy Image Compression Using Wavelet Transform, Polynomial Prediction And Block Truncation Coding
...Show More Authors

View Publication
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Fri Dec 24 2021
Journal Name
Journal Of Engineering Science And Technology. Journal Of Engineering Science And Technology
Grey-Level Image Compression Using 1-D Polynomial and Hybrid Encoding Techniques
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Characterization of smoker and non smoker human teeth using laser induced breakdown spectroscopy
...Show More Authors

In this work, the elemental constituents of smoker and nonsmoker
teeth samples of human were analyzed by Laser induced breakdown
spectroscopy method (LIBS). Many elements have been detected in
the healthy teeth samples, the important once are Ca, P, Mg, Fe, Pb
and Na. Many differences were found between (female and male)
teeth in Ca, P, Mg, Na and Pb contents. The concentrations of most
toxic elements were found significantly in the smoker group. The
maximum concentrations of toxic elements such as Pb, Cd and Co
were found in older male age above 60 year. Also, it was found that
the minimum concentrations of trace elements such as Ca, P and Na
exist in this age group. From these results it is clear that the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Journal The College Of Basic Education / Al-mustansiriyah University
Numerical Solution of Non-linear Delay Differential Equations Using Semi Analytic Iterative Method
...Show More Authors

We present a reliable algorithm for solving, homogeneous or inhomogeneous, nonlinear ordinary delay differential equations with initial conditions. The form of the solution is calculated as a series with easily computable components. Four examples are considered for the numerical illustrations of this method. The results reveal that the semi analytic iterative method (SAIM) is very effective, simple and very close to the exact solution demonstrate reliability and efficiency of this method for such problems.

View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 23 2019
Journal Name
Journal Of The College Of Basic Education
Numerical Solution of Non-linear Delay Differential Equations Using Semi Analytic Iterative Method
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Determination of Mono-crystalline Silicon Photovoltaic Module Parameters Using Three Different Methods
...Show More Authors

For modeling a photovoltaic module, it is necessary to calculate the basic parameters which control the current-voltage characteristic curves, that is not provided by the manufacturer. Generally, for mono crystalline silicon module, the shunt resistance is generally high, and it is neglected in this model. In this study, three methods are presented for four parameters model. Explicit simplified method based on an analytical solution, slope method based on manufacturer data, and iterative method based on a numerical resolution. The results obtained for these methods were compared with experimental measured data. The iterative method was more accurate than the other two methods but more complexity. The average deviation of

... Show More
View Publication Preview PDF