Preferred Language
Articles
/
Vha2ZIkBVTCNdQwCSYkW
Improvement of noisy images filtered by bilateral process using a multi-scale context aggregation network
...Show More Authors

Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for de-noising noisy CCTV images. Data-store is used tomanage our dataset, which is an object or collection of data that are huge to enter in memory, it allows to read, manage, and process data located in multiple files as a single entity. The CAN architecture provides integral deep learning layers such as input, convolution, back normalization, and Leaky ReLu layers to construct multi-scale. It is also possible to add custom layers like adaptor normalization (µ) and adaptive normalization (Lambda) to the network. The performance of the developed CAN approximation operator on the bilateral filtering noisy image is proven when improving both the noisy reference image and a CCTV foggy image. The three image evaluation metrics (SSIM, NIQE, and PSNR) evaluate the developed CAN approximation visually and quantitatively when comparing the created de-noised image over the reference image.Compared with the input noisy image, these evaluation metrics for the developed CAN de-noised image were (0.92673/0.76253, 6.18105/12.1865, and 26.786/20.3254) respectively

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Crescent Moon Visibility: A New Criterion using Deep learned Artificial Neural-Network
...Show More Authors

     Many authors investigated the problem of the early visibility of the new crescent moon after the conjunction and proposed many criteria addressing this issue in the literature. This article presented a proposed criterion for early crescent moon sighting based on a deep-learned pattern recognizer artificial neural network (ANN) performance. Moon sight datasets were collected from various sources and used to learn the ANN. The new criterion relied on the crescent width and the arc of vision from the edge of the crescent bright limb. The result of that criterion was a control value indicating the moon's visibility condition, which separated the datasets into four regions: invisible, telescope only, probably visible, and certai

... Show More
Preview PDF
Scopus Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Lossless Compression of Medical Images using Multiresolution Polynomial Approximation Model
...Show More Authors

In this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.

View Publication
Crossref (4)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Biochem. Cell. Arch
Improvement the surface properties of metal valves used in agriculture engine by using CO<inf>2</inf> laser beam
...Show More Authors

Preview PDF
Scopus (8)
Scopus
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Improvement the bearing capacity of the soil which is supporting the shallow foundation by using bored short micro-piles
...Show More Authors

In this paper , concrete micro-piles were used to improve the bearing capacity of the soil which is supporting the shallow foundation by using groups of (4; 6 and 9)bored short micro-piles which have, (D=0.125m and D=0.1m), and length to diameter ratio (L/D) equal to (6; 10 and 12) respectively. To calculate the bearing capacity of the micro-piles,(Tomlinson) and (Lamda) methods were used; also the soil properties were taken from Al-Muthana airport,(Al-Qyssi,2001) [1]. The results show that; increasing the number of piles and/ or the diameters and lengths; and the interaction between the bearing capacity of the shallow foundation with the bearing capacity of the pile group which leads to increasing the strength against the external loads

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Arab World English Journal
How Impoliteness Is Portrayed in a School Context: The Marva Collins as a Case Study
...Show More Authors

The present study attempts to examine verbal/nonverbal impoliteness in the classroom interaction and outside it in one of the movies, namely, The Marva Collins. Impoliteness, which is significantly studied within pragmatics, is a negative attitude towards particular behaviors. It always presumes to have emotional concerns for at least one participant who has caused it. This study is an attempt to examine verbal/nonverbal impoliteness in The Marva Collins movie. The study aims to investigate the different types of impoliteness strategies used in the four selected scenes and find out whether the speaker’s status has anything to do with the types of impoliteness. Besides, the functions performed are also examined by following a qual

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Improvement of Resistance Spot Welding by Surfaces Treatment of AA1050 Sheets
...Show More Authors

Resistance spot welding (RSW) aluminum alloys has a major problem of inconsistent quality from weld to weld, because of the problems of the non-uniform oxide layer. The high resistivity of the oxide causes strong heat released which influence significantly on the electrode lifetime and the weld quality. Much effort has been devoted experimentally to the study of the sheet surface characteristics for as-received sheet and surface pretreatment sheet by pickling in NaOH and glassblasted with three thicknesses (0.6, 1.0, and 1.5 mm) of AA1050. Three different welding process parameters energy setup as a low, medium, and high were carried. Tensile-shear strength tests were performed to indicate the weld quality. Moreover, microhardness tests,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF