Preferred Language
Articles
/
bsj-9768
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a series of preprocessing operations, the oriented gradient histograms (HOG) features are extracted from the images. During model training, different weights are assigned to classes with varying sample quantities to address the issue of class imbalance and improve the model's classification accuracy. Results show that the model achieves an accuracy of 95.30%. This research can help historians quickly identify and extract the text content on newly discovered Qin slip cultural relics, shortening the cycle of building a historical database.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 02 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
The Making of a Heroine: A Female Character as Portrayed in The English Patient By Michael OndaatjE
...Show More Authors

This article discusses how women have significant abilities to cope with the difficulties of war times. They are not the weak and vulnerable victims who are thought to be. On the contrary, they have the power to control over many-sided fronts, like participating in the battlefield as nurses or activists for peace, or even fighters, as well as through the tasks and responsibilities assigned to them to protect and support their families during wartime. The researcher will examine the impact of war upon women. Like men, women suffer during wartime. They are being injured, tortured and killed. Yet, they are able to give examples of love and courage even in the difficult times of war. Hana is one of those women who lived during wartimes,

... Show More
View Publication
Crossref
Publication Date
Wed Jul 09 2025
Journal Name
Journal Of Babylon Center For Humanities Studies
The reflection of the Arab character in Israeli children's literature in the years 1990 - 2015
...Show More Authors

View Publication
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Object Reconstruction From Fourier Magnitude Information Only
...Show More Authors

Reconstruction an object from its Fourier magnitude has taken a great deal in the literature and there is still no obvious solution for the failure of this algorithm. In this paper, the frequent failure of the phase retrieval is discussed in details and it has been shown that when the object is cento-symmetric, the object support is vital element to ensure uniqueness while for asymmetric object; the asymmetric support of the object is not enough to ensure uniqueness but the reconstruction appear to include most of the information of the original object. This is also true for the reconstruction of a complex function.

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Information Using different lighting Color images
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Semantic Similarity Assessment of Volunteered Geographic Information
...Show More Authors

The recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semantic accuracy a

... Show More
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Semantic Similarity Assessment of Volunteered Geographic Information
...Show More Authors

The recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semanti

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
Mass Media Communications Misdirecting in Broadcasting Information
...Show More Authors

The current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multiple activities in the field of media and is far away from the effects imposed by the media institutions on employees with respect to the adoption of the institution policy, its agenda, and the trends financing it. The current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multipl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Advanced Research In Computer And Communication Engineering
Information hiding by using Developed M8PAM Technique
...Show More Authors

Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication