Preferred Language
Articles
/
bsj-2998
Moving Objects Detection Based on Frequency Domain: image processing
...Show More Authors

In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 09 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Matching assessment of road network objects of volunteered geographic information
...Show More Authors

Recently new concepts such as free data or Volunteered Geographic Information (VGI) emerged on Web 2.0 technologies. OpenStreetMap (OSM) is one of the most representative projects of this trend. Geospatial data from different source often has variable accuracy levels due to different data collection methods; therefore the most concerning problem with (OSM) is its unknown quality. This study aims to develop a specific tool which can analyze and assess the possibility matching of OSM road features with reference dataset using Matlab programming language. This tool applied on two different study areas in Iraq (Baghdad and Karbala), in order to verify if the OSM data has the same quality in both study areas. This program, in general, consists

... Show More
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Animation from a legitimate perspective
...Show More Authors

This study aims at investigating the partial Islamic rules of preparing and distributing cartoons in order to issue an overall Islamic rul. To reach an end, descriptive and analytical approaches are adopted to clarify the nature of cartoons and other related concepts. The researcher, as well, with reference to verses of the Holy Quran, tradition (Hadith) and Islamic jurists, adopts a deductive approach to issue Islamic rules related to the industry of cartoons and it's distribution
The study consists of three sections. The first Section addresses the following issues: Definition animation; and related wordy. The second Section: Origin of Cartoon's history and it's negative and positive effects. The third Section: Islamic rules related

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Aesthetic performance in the mobile sculptures
...Show More Authors

Aesthetic performance in the mobile sculptures
Ali Abd Almohsen Ali
Abstract
Chapters of this research are discussed one of the turning points in the In the history of sculpture, which sparked a debate in artistic circles, namely the introduction of the actual movement in sculpture . The researcher highlighted on one of the corners of the controversy on this subject for discussion and looking in and Found results contribute to answer some questions . the Beginning been allocated to the statement of this Research Methodology , research problem, and its importance, and its goal, and borders , the main problem is Lack of clarity of the concept of real motion (physical) in the sculpture , And how the audience understand the aspects

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Early detection of breast cancer mass lesions by mammogram segmentation images based on texture features
...Show More Authors

Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Satirical Television Programs and Their Impact on the Image of Iraqi Politicians
...Show More Authors

This research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
International Journal Of Computer Science And Mobile Computing
Hierarchical Fixed Prediction of Mixed based for Medical Image Compression.
...Show More Authors

Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF