Preferred Language
Articles
/
ijs-6237
A Modified Segmentation Approach for Real World Images Based on Edge Density Associated with Image Contrast Stretching
...Show More Authors

Segmentation of real world images considered as one of the most challenging tasks in the computer vision field due to several issues that associated with this kind of images such as high interference between object foreground and background, complicated objects and the pixels intensities of the object and background are almost similar in some cases. This research has introduced a modified adaptive segmentation process with image contrast stretching namely Gamma Stretching to improve the segmentation problem. The iterative segmentation process based on the proposed criteria has given the flexibility to the segmentation process in finding the suitable region of interest. As well as, the using of Gamma stretching will help in separating the pixels of the objects and background through making the dark intensity pixels darker and the light intensity pixels lighter. The first 20 classes of Caltech 101 dataset have been utilized to demonstrate the performance of the proposed segmentation approach. Also, the Saliency Cut method has been adopted as a benchmark segmentation method. In summary, the proposed method improved some of the segmentation problems and outperforms the current segmentation method namely Saliency Cut method with segmentation accuracy 77.368%, as well as it can be used as a very useful step in improving the performance of visual object categorization system because the region of interest is mostly available.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Modified Iterative Method for Solving Sine - Gordon Equations
...Show More Authors

       The basic goal of this research is to utilize an analytical method which is called the Modified Iterative Method in order to gain an approximate analytic solution to the Sine-Gordon equation. The suggested method is the amalgamation of the iterative method and a well-known technique, namely the Adomian decomposition method. A method minimizes the computational size, averts round-off errors, transformation and linearization, or takes some restrictive assumptions. Several examples are chosen to show the importance and effectiveness of the proposed method. In addition, a modified iterative method gives faster and easier solutions than other methods. These solutions are accurate and in agreement with the series

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Image And Graphics
Normalized-UNet Segmentation for COVID-19 Utilizing an Encoder-Decoder Connection Layer Block
...Show More Authors

The COVID-19 pandemic has had a huge influence on human lives all around the world. The virus spread quickly and impacted millions of individuals, resulting in a large number of hospitalizations and fatalities. The pandemic has also impacted economics, education, and social connections, among other aspects of life. Coronavirus-generated Computed Tomography (CT) scans have Regions of Interest (ROIs). The use of a modified U-Net model structure to categorize the region of interest at the pixel level is a promising strategy that may increase the accuracy of detecting COVID-19-associated anomalies in CT images. The suggested method seeks to detect and isolate ROIs in CT scans that show the existence of ground-glass opacity, which is fre

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 12 2010
Journal Name
Alustath Journal For Human And Social Sciences
Suggested Approach to deal with Multicollinearity Problem – with Application –
...Show More Authors

This research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance

... Show More
Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Embedding a Digitized Watermark Upon Colored Image Using Wavelet Transform with Comparative Technique
...Show More Authors

A special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed with

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
The transition rates for 232Th using the two component particle-hole state density with different corrections
...Show More Authors

The particle-hole state densities have been calculated for 232Th in
the case of incident neutron with  ,  1 Z Z T T T T and   2 Z T T .
The finite well depth, surface effect, isospin and Pauli correction are
considered in the calculation of the state densities and then the
transition rates. The isospin correction function ( ) iso f has been
examined for different exciton configurations and at different
excitation energies up to 100 MeV. The present results are indicated
that the included corrections have more affected on transition rates
behavior for        , , and    above 30MeV excitation energy

View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Attention Mechanism Based on a Pre-trained Model for Improving Arabic Fake News Predictions
...Show More Authors

     Social media and news agencies are major sources for tracking news and events. With these sources' massive amounts of data, it is easy to spread false or misleading information. Given the great dangers of fake news to societies, previous studies have given great attention to detecting it and limiting its impact. As such, this work aims to use modern deep learning techniques to detect Arabic fake news. In the proposed system, the attention model is adapted with bidirectional long-short-term memory (Bi-LSTM) to identify the most informative words in the sentence. Then, a multi-layer perceptron (MLP) is applied to classify news articles as fake or real. The experiments are conducted on a newly launched Arabic dataset called the Ara

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref