Preferred Language
Articles
/
PRZnrosBVTCNdQwCpdbE
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing small binary codebook, then rotating each block in it. Moreover, it can be used for improving the efficiency of the coding process even further with the decrease in the bit rate (i.e. increasing the compression ratio(.

Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Z-Small Submodules and Z-Hollow Modules

A submodule Ϝ of an R-module Ε is called small in Ε if whenever  , for some submodule W of Ε , implies  . In this paper , we introduce the notion of Ζ-small submodule , where a proper submodule Ϝ of an R-module Ε is said to be Ζ-small in Ε if  , such that  , then  , where  is the second singular submodule of Ε . We give some properties of Ζ-small submodules . Moreover , by using this concept , we generalize the notions of hollow modules , supplement submodules, and supplemented modules into Ζ-hollow modules, Ζ-supplement submodules, and Ζ-supplemented modules. We study these concepts and provide some of their relations .

Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Purely Small Submodules and Purely Hollow Modules

         The main goal of this paper is to give  a new generalizations for two important classes in the category of modules, namely the class of small submodules and the class of hollow modules. They are purely small submodules and purely hollow modules respectively. Various properties of these classes of modules are investigated. The relationship between purely small submodules and P-small submodules which is introduced by Hadi and Ibrahim, is studied. Moreover, another characterization of  purely hollow modules is considered.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Apr 17 2023
Journal Name
Wireless Communications And Mobile Computing
A Double Clustering Approach for Color Image Segmentation

One of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first

... Show More
Scopus (2)
Scopus Crossref
View Publication
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Science And Research (ijsr)
Color-based for tree yield fruits image counting

Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit

... Show More
View Publication
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System

     Face detection systems are based on the assumption that each individual has a unique face structure and that computerized face matching is possible using facial symmetry. Face recognition technology has been employed for security purposes in many organizations and businesses throughout the world. This research examines the classifications in machine learning approaches using feature extraction for the facial image detection system. Due to its high level of accuracy and speed, the Viola-Jones method is utilized for facial detection using the MUCT database. The LDA feature extraction method is applied as an input to three algorithms of machine learning approaches, which are the J48, OneR, and JRip classifiers.  The experiment’s

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

Scopus (2)
Scopus
View Publication
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation Optimal Threshold Value for Image Edge Detection

      A new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2024
Journal Name
Al-mustansiriyah Journal Of Science