Preferred Language
Articles
/
dhYLAIoBVTCNdQwCO49X
Stamps extraction using local adaptive k- means and ISODATA algorithms

<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected region to produce a binary mask for the stamp area. Finally, the binary mask is combined with the original image to extract the stamp regions. The results indicate that the number of clusters can be determined dynamically and the largest cluster that has minimum standard deviation (i.e., always the largest cluster is the background cluster). Also, show that the binary mask can be established from more than one segment to cover are all stamp’s disconnected pieces and it can be useful to remove the noise appear with stamp region.</span>

Scopus Crossref
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic diversity of Capsicum annuum L. in local and imported samples in Iraq by using RAPD-PCR

Genetic variation was studied in 22 local and imported samples collected from local Iraqi market by using random amplified polymorphic DNA (RAPD-PCR). Five randomly primers set were used in this study. These primers produced 292 bands. Molecular weights of these bands ranged between 1.8 Kb (1800 bp) to 150 bp. The percentage of polymorphic bands is 100%, with one distinguished band which is produced by using C52 primer. The other primers did not produce any distinguished band. The results of Dendrogram of the studied samples depended on RAPD-PCR results by using Jaccard coefficient for genetic similarity was distributed the samples into 8 groups. This Dendrogram revealed a higher similarity between Iraqi/Yousifia green bell pepper and Jo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Extraction Drainage Network for Lesser Zab River Basin from DEM using Model Builder in GIS

ArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of American Science
Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Adaptive Response and its relation to Cognitive Appraisal among Secondary School Students

The current research's problem includes the impact of cognitive reappraisal and reformulate on self-experience of emotional response and its negative feelings and the activity of cognitive reappraisal in changing response. The aim of this research is to detect the relation between adaptive response and cognitive reappraisal upon students of secondary school, and to find differences in gender and stage. The sample contained male and female student for the year(2022-2023) and consists of (480) students (240) male and (240) female in the karkh education/ 1 To achieve this aims researcher used descriptive method and to measure the two variables researcher built a scale for adaptive response according to theory of compound emotion (Barrett,20

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Genetic Algorithm-Based Anisotropic Diffusion Filter and Clustering Algorithms for Thyroid Tumor Detection

Medical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun May 20 2018
Journal Name
Romansy 22 – Robot Design, Dynamics And Control
Scopus (6)
Crossref (4)
Scopus Crossref
View Publication
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
New Adaptive Data Transmission Scheme Over HF Radio

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Engineering, Ije Transactions B: Applications
Scopus (2)
Scopus