Preferred Language
Articles
/
bsj-9775
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can precisely recognize the human central issues, really work on the exactness of human posture assessment, and can adjust to the intricate scenes with thick individuals and impediment. Finally, the difficulties and possible future trends are described, and the development of the field is presented.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Red Monkey Optimization and Genetic Algorithm to Solving Berth Allocation Problems
...Show More Authors

In the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Evolving Systems
Boosted Aquila Arithmetic Optimization Algorithm for multi-level thresholding image segmentation
...Show More Authors

View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Role of ERP Systems in Improving Human Resources Management Processes
...Show More Authors

This study investigates the role of Enterprise Resources Planning (ERP) systems in improving human resources management (HRM) processes. The rapid environmental changes led to increased demand on the ERP systems, which have changed the manual effort to technology-based processes, providing solutions focusing on the integration of all departments to achieve goals for the entire organization. HRM processes are mainly made up of two classes: strategic and operational HRM. An ERP system works to integrate both of them, making HRM processes more efficient, effective and feasible to provide support to the organization as a whole (inside and outside). In this article, a modest framework is proposed to describe HRM process integrity in relation to

... Show More
Scopus (5)
Scopus
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Hiring managers tacit knowledge in the electronic Human Resource Management
...Show More Authors

Abstract
            This research aims to determine the nature of tacit knowledge relationship and its impact on building the electronic human resources management, as it constitutes the most prominent tacit knowledge resources owned by the Organization for being a stand out in the skill, knowledge and intellectual capacity of human resources, as the electronic human resources management is a contemporary trend that adopted by the organization in the performance of all tasks and duties related workers have remained in the contemporary environment in which it operates.

and have indicated the research problem to the low level of awareness of the ad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Human ability (Al qoudra) according to speakers and Fundamentalist jurists
...Show More Authors

The term of ability (Al qoudra) is of the common terms which used by speech scientists to relate to one of the important verbal issues which called “Fate and destiny”. the issues of fate and destiny has been raised by Muslims since the dawn of Islam and It was researched among speech scientists, there are many opinions about this issues as the man can do or leave anything or he forced to do something that mean he hasn’t ability.

Also the term was used by jurists and they mention to the ability conditions (Assigning the Divine) and when this conditions are not available that means the man is not commissioning, the conditions are Mind, puberty and other conditions which mentioned in the books of jurisp

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Isolation of CD34+ Human Melanocyte Stem Cells from Hair Follicles
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Advancements In Life Sciences
Molecular identification of Epstein-Barr virus in human placental tissue
...Show More Authors

Background: The Epstein-Barr virus (EBV) relates to the torch virus family and is believed to have a substantial impact on mortality and perinatal events, as shown by epidemiological and viral studies. Moreover, there have been documented cases of EBV transmission occurring via the placenta. Nevertheless, the specific location of the EBV infection inside the placenta remains uncertain. Methods: The genomic sequences connected to the latent EBV gene and the levels of lytic EBV gene expression in placental chorionic villous cells are examined in this work. A total of 86 placentas from patients who had miscarriage and 54 placentas from individuals who had successful births were obtained for analysis. Results: The research employed QPCR to dete

... Show More
Preview PDF
Scopus