Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensities. In the third stage, the boundary of the target object is extracted, and in the fourth and fifth stages, respectively, the region of interest (ROI) is highlighted and reconstructed. Our model was tested and evaluated using realistic scenarios which include outdoor and indoor scenes. The results reflect the ability of our approach to detect and remove shadows and reconstruct a shadow free image with a small error of approximately 6%.
Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreThe lethality of inorganic arsenic (As) and the threat it poses have made the development of efficient As detection systems a vital necessity. This research work demonstrates a sensing layer made of hydrous ferric oxide (Fe2H2O4) to detect As(III) and As(V) ions in a surface plasmon resonance system. The sensor conceptualizes on the strength of Fe2H2O4 to absorb As ions and the interaction of plasmon resonance towards the changes occurring on the sensing layer. Detection sensitivity values for As(III) and As(V) were 1.083 °·ppb−1 and 0.922 °·ppb
For the period from February 2014 till May 2014, one hundred and nine lactose fermenter clinical isolates from different samples (urine, stool, wound swab, blood, and sputum) were collected from Alyarmok, Alkadimiya, and Baghdad teaching hospitals at Baghdad governorate. Identification of all Klebsiella pneumoniae isolates were carried out depending on macroscopic, microscopic characterizations, conventional biochemical tests, and Api 20E system. Fifty-three (48.62%) isolates represented K. pneumoniae; however, 51.73% represented other bacteria. Susceptibility test was achieved to all fifty-three K. pneumoniae isolates using five antibiotic disks (Ceftazidime, Ceftriaxone, Cefotaxime, Imipenem, and Meropenem). Most of tested isolates (90
... Show MoreCdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide f
... Show MoreHerpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show More