Preferred Language
Articles
/
iRf1UZEBVTCNdQwCl5So
A New Face Swap Detection Technique for Digital Images
...Show More Authors

Scopus
View Publication
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Deep Convolutional Neural Network Architecture to Detect COVID-19 from Chest X-Ray Images
...Show More Authors

      Today, the world is living in a time of epidemic diseases that spread unnaturally and infect and kill millions of people worldwide. The COVID-19 virus, which is one of the most well-known epidemic diseases currently spreading, has killed more than six million people as of May 2022. The World Health Organization (WHO) declared the 2019 coronavirus disease (COVID-19) after an outbreak of SARS-CoV-2 infection. COVID-19 is a severe and potentially fatal respiratory disease caused by the SARS-CoV-2 virus, which was first noticed at the end of 2019 in Wuhan city. Artificial intelligence plays a meaningful role in analyzing medical images and giving accurate results that serve healthcare workers, especially X-ray images, which are co

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jul 07 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI Images using superpixels based split and Merge algorithm
...Show More Authors

RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2

View Publication
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Detection of Genetic Modified Feed Component
...Show More Authors

There are growing concerns over the possibility of transfer genetically modified
sequences from genetically modified feed component (GM feed) to animals and
their products, moreover, affect these sequences on animal and human health. This
study was implemented to detect P35S in modified feed by using PCR technique by
detecting presence P35S promoter, which responsible for the regulation of gene
expression for most of the transgenic genes. Thirty eight feed samples were
collected from different sources of Baghdad markets, which have been used for
feeding livestock, comprise 21 coarse mixes feed, 13 pelleted feed, and 4 expanded
feed. Genomic DNA was extracted by using two methods, CTAB method and
Wizard kit. In

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Detection of Genetic Modified Feed Component
...Show More Authors

There are growing concerns over the possibility of transfer genetically modified sequences from genetically modified feed component (GM feed) to animals and their products, moreover, affect these sequences on animal and human health. This study was implemented to detect P35S in modified feed by using PCR technique by detecting presence P35S promoter, which responsible for the regulation of gene expression for most of the transgenic genes. Thirty eight feed samples were collected from different sources of Baghdad markets, which have been used for feeding livestock, comprise 21 coarse mixes feed, 13 pelleted feed, and 4 expanded feed. Genomic DNA was extracted by using two methods, CTAB method and Wizard kit. In order to verify the presenc

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Image Retrieval Using Data Mining Technique
...Show More Authors

Even though image retrieval is considered as one of the most important research areas in the last two decades, there is still room for improvement since it is still not satisfying for many users. Two of the major problems which need to be improved are the accuracy and the speed of the image retrieval system, in order to achieve user satisfaction and also to make the image retrieval system suitable for all platforms. In this work, the proposed retrieval system uses features with spatial information to analyze the visual content of the image. Then, the feature extraction process is followed by applying the fuzzy c-means (FCM) clustering algorithm to reduce the search space and speed up the retrieval process. The experimental results show t

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Edge Detection Using Circular Sliding Window
...Show More Authors

    In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF