Preferred Language
Articles
/
ijs-3825
Image Segmentation Using PSO-Enhanced K-Means Clustering and Region Growing Algorithms
...Show More Authors

    Image segmentation is a basic image processing technique that is primarily used for finding segments that form the entire image. These segments can be then utilized in discriminative feature extraction, image retrieval, and pattern recognition. Clustering and region growing techniques are the commonly used image segmentation methods. K-Means is a heavily used clustering technique due to its simplicity and low computational cost. However, K-Means results depend on the initial centres’ values which are selected randomly, which leads to inconsistency in the image segmentation results. In addition, the quality of the isolated regions depends on the homogeneity of the resulted segments. In this paper, an improved K-Means clustering algorithm is proposed for image segmentation. The presented method uses Particle Swarm Intelligence (PSO) for determining the initial centres based on Li’s method. These initial centroids are then fed to the K-Means algorithm to assign each pixel into the appropriate cluster. The segmented image is then given to a region growing algorithm for regions isolation and edge map generation. The experimental results show that the proposed method gives high quality segments in a short processing time.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of direct withholding tax procedures as a tool to increase tax proceeds : applied research in the General Tax Authority / Direct Deduction Department
...Show More Authors

The research aims to evaluate the direct deduction department’s procedures for the process of collecting income tax using the direct deduction method for state departments and the public sector in light of direct deduction tax instructions No. (1) of 2007 and Income Tax Law No. (113) of 1982 (amended) through Giving a clear idea of ​​the reality of tax collection procedures because this type of tax is one of great importance because it contributes to the provision of financial revenues to the state to finance its expenses and direct the economy towards achieving its social, economic and political goals. The researcher makes comparisons between the procedures of the General Tax Authority in collecting the tax and what was approved b

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simulation Expirment for Proofing the Theoretical Assumption of Time Complexity for Binary Search Tree
...Show More Authors

      It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree).  This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method  to prove th

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Energy Methods For Initial –Boundary String Problem
...Show More Authors

  We study one example of hyperbolic problems it's Initial-boundary string problem with two ends. In fact we look for the solution in weak sense in some sobolev spaces. Also we use energy technic with Galerkin's method to study some properties for our problem as existence and uniqueness

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Exact Solution for Systems of Nonlinear (2+1)D-Differential Equations
...Show More Authors

      The aim of this article is to present the exact analytical solution for models as system of (2+1) dimensional PDEs by using a reliable manner based on combined LA-transform with decomposition technique and the results have shown a high-precision, smooth and speed convergence to the exact solution compared with other classic methods. The suggested approach does not need any discretization of the domain or presents assumptions or neglect for a small parameter in the problem and does not need to convert the nonlinear terms into linear ones. The convergence of series solution has been shown with two illustrated examples such (2+1)D- Burger's system and (2+1)D- Boiti-Leon-Pempinelli (BLP) system.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
On y-closed Dual Rickart Modules
...Show More Authors

In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On A Bitopological (1,2)*- Proper Functions
...Show More Authors

   In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
 

View Publication Preview PDF
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synergistic Effect of Potassium Iodide on Inhibitive Performance of Propyl Alcohol during Corrosion of Mild Steel in 1.0M HCl
...Show More Authors

   The inhibition of mild steel corrosion in 1.0M HCl by 1-propanol and the synergistic effect of potassium iodide (KI) was investigated using weight loss and polarization techniques in the temperature range (30 ‒ 50) ̊ C. A matrix of Doelhert to three factors was used as the experimental design, adopting weight loss results as it permits the use of the response surface methodology which exploited in determination of the synergistic effect as inhibition on the mild steel. The results were confirmed using electrochemical polarization measurements. Experimental results showed that the inhibition efficiency (IE%) increases with increase in concentration of inhibitor and with increasing of temperature. The addition iodide ions t

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
The Classical Continuous Optimal Control for Quaternary Nonlinear Parabolic Boundary Value Problems
...Show More Authors

In this paper, our purpose is to study the classical continuous optimal control (CCOC)  for quaternary nonlinear parabolic boundary value problems (QNLPBVPs). The existence and uniqueness theorem (EUTh) for the quaternary state vector solution (QSVS) of the weak form (WF) for the QNLPBVPs with a given quaternary classical continuous control vector (QCCCV) is stated and proved via the Galerkin Method (GM) and the first compactness theorem under suitable assumptions(ASSUMS). Furthermore, the continuity operator for the existence theorem of a QCCCV dominated by the QNLPBVPs is stated and proved under suitable conditions.

View Publication Preview PDF
Scopus Crossref