Preferred Language
Articles
/
QhedFJIBVTCNdQwCLp7d
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensities. In the third stage, the boundary of the target object is extracted, and in the fourth and fifth stages, respectively, the region of interest (ROI) is highlighted and reconstructed. Our model was tested and evaluated using realistic scenarios which include outdoor and indoor scenes. The results reflect the ability of our approach to detect and remove shadows and reconstruct a shadow free image with a small error of approximately 6%.

Scopus Crossref
View Publication
Publication Date
Fri Apr 26 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Solving Tri-criteria: Total Completion Time, Total Earliness, and Maximum Tardiness Using Exact and Heuristic Methods on Single-Machine Scheduling Problems
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Serum Vascular Endothelial Growth Factor VEGF and Interlukin-8 As a Novel Biomarkers For Early Detection of Ovarian Tumors
...Show More Authors

Epithelial ovarian cancer is the leading cause of cancer deaths from gynecological malignancies. Angiogenesis is considered essential for tumor growth and the development of metastases. VEGF and IL?8 are potent angiostimulatory molecules and their expression has been demonstrated in many solid tumors, including ovarian cancer.VEGF and IL-8 concentrations were measured by ELISA test (HumanVEGF,IL-8). Bioassay ELISA/ US Biological / USA).The median VEGF and IL-8 levels were significantly higher in the sera of ovarian cancer patients than in those with benign tumors and in healthy controls.Pretreatment VEGF and IL-8 serum levels might be regarded as an additional tool in the differentiation of ovarian tumors.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
The Effect of Cohesive Debonding Elimination on Enhancing the Flexural Performance of Damaged Unbonded Prestressed Concrete Girders Strengthened Using NSM CFRP
...Show More Authors

This manuscript studied the effect of U-CFRP wrapped sheet anchorage on the flexural performance of unbonded post-tensioned PC members subjected to partial strand damage and strengthened using CFRP Near-Surface Mounting techniques. The program includes six girders as a control girder, a girder with strand damage of 14.2%, and four girders strengthened by CFRP laminates using the NSM technique with and without U-CFRP wrapped sheet anchorages. The testing results show that the strand damage of 14.2% has reduced the flexural strength of the girder by 5.71%. The NSM-CFRP laminate has a significant effect on flexural strength by 17.4%. On the other hand, the application of end U-CFRP wrapped sheet anchorages improves flexural

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Detection of Polyomavirus BK and JC in kidney Transplant Recipients
...Show More Authors

objectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 26 2021
Journal Name
Remote Sensing Technologies And Applications In Urban Environments Vi
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Detection and Diagnosis of Induction Motor Faults by Intelligent Techniques
...Show More Authors

This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and  two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi

... Show More
View Publication Preview PDF