Preferred Language
Articles
/
ijs-3912
Highly-Performed Fuzzily-logicized Edge Detecting Algorithm for Noisy Handwritings
...Show More Authors

The main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free images.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Studying the contribution of components and type of spiral galaxy NGC 6946 using digital image processing
...Show More Authors

NGC 6946 have been observed with BVRI filters, on October 15-18,
2012, with the Newtonian focus of the 1.88m telescope, Kottamia
observatory, of the National Research Institute of Astronomy and
Geophysics, Egypt (NRIAG), then we combine the BVRI filters to
obtain an astronomical image to the spiral galaxy NGC 6946 which
is regarded main source of information to discover the components of
this galaxy, where galaxies are considered the essential element of
the universe. To know the components of NGC 6946, we studied it
with the Variable Precision Rough Sets technique to determine the
contribution of the Bulge, disk, and arms of NGC 6946 according to
different color in the image. From image we can determined th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed May 15 2019
Journal Name
Tikrit Journal Of Pure Science
Improvement of Alert System against Tampering and Theft in Surveillance Cameras
...Show More Authors

Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic

... Show More
View Publication
Publication Date
Tue Dec 29 2020
Journal Name
Iraqi Journal Of Science
ANALYSIS of INTERFERENCE PATTERN of the FIBER INTERFEROMETER as a MOTION SENCOR
...Show More Authors

The production and analysis of an optimal interference pattern for the optical fiber interferometer of a 193.1THz continuous laser source was simulated by comparing the spectral spectroscopy of the two arms of interferometer to be used as a heterodyne detection in sensing the body range, speed, and direction of movement by delaying the time between the arms.

     The study showed that the fringe pattern can be sensed a range by the free spectral range FSR and the velocity by the fringe separation FS and the direction by the fringe spatial frequency FSF.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Review of Automatic Speaker Profiling: Features, Methods, and Challenges
...Show More Authors

Automatic Speaker Profiling (ASP), is concerned with estimating the physical traits of a person from their voice. These traits include gender, age, ethnicity, and physical parameters. Reliable ASP has a wide range of applications such as mobile shopping, customer service, robotics, forensics, security, and surveillance systems.  Research in ASP has gained interest in the last decade, however, it was focused on different tasks individually, such as age, height, or gender. In this work, a review of existing studies on different tasks of speaker profiling is performed. These tasks include age estimation and classification, gender detection, height, and weight estimation This study aims to provide insight into the work of ASP, available dat

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Automatic Pectoral Muscles Detection and Removal in Mammogram Images
...Show More Authors
The main aim of the Computer-Aided Detection/Diagnosis system is to assist the radiologists in examining the digital mammograms. Digital mammogram is the most popular screening technique for early detection of breast cancer. One of the problems in breast mammogram analysis is the presence of pectoral muscles region with high intensity in the upper right or left side of most Media-Lateral Oblique views of mammogram images. Therefore, it is important to remove this pectoral muscle from the image for
... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A Study of Some of the Indicators of Noise Pollution in Certain Residential Districts in Fallujah City
...Show More Authors

     The aim of this study was to evaluate the effects of noise exposure in certain residential districts in Fallujah city. Twenty-nine stations were selected and divided into two groups; the first group was located 50 to 100 metres from the main streets (quiet areas), whilst the second was located directly on the main streets. Noise levels were measured at a rate of three readings per station for different time periods for approximately sixty days in the year 2020. Mean values were taken in both the morning and evening using a portable sound level meter (Auto range, RS-232). The highest noise level was measured at Alforkan station for the morning reading (83.8 dB) within the second group, while the lowest noise level

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Assessment of Observed Building Structure Setback of Shops along an Arterial Road and Noise Intrusion Level
...Show More Authors

Roads irrespective of the type have specific standard horizontal distance measured at 90 degrees from a lot boundary to a development known as a setback. Non-observance of the recommended setbacks accommodated in any urban center’s master plan creates noise hazard to the public health and safety as the movement of vehicular traffic is not without the attendant noise. This study assessed noise intrusion level in shops along a section of Ibadan-Abeokuta road with due consideration to compliance with the recommended building structure setback. Analysis of noise descriptors evaluated in this study gave A-weighted equivalent sound pressure level average of 91.3 dBA, the daytime average sound level (LD) 92.27 dBA,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref