Preferred Language
Articles
/
ijs-6237
A Modified Segmentation Approach for Real World Images Based on Edge Density Associated with Image Contrast Stretching
...Show More Authors

Segmentation of real world images considered as one of the most challenging tasks in the computer vision field due to several issues that associated with this kind of images such as high interference between object foreground and background, complicated objects and the pixels intensities of the object and background are almost similar in some cases. This research has introduced a modified adaptive segmentation process with image contrast stretching namely Gamma Stretching to improve the segmentation problem. The iterative segmentation process based on the proposed criteria has given the flexibility to the segmentation process in finding the suitable region of interest. As well as, the using of Gamma stretching will help in separating the pixels of the objects and background through making the dark intensity pixels darker and the light intensity pixels lighter. The first 20 classes of Caltech 101 dataset have been utilized to demonstrate the performance of the proposed segmentation approach. Also, the Saliency Cut method has been adopted as a benchmark segmentation method. In summary, the proposed method improved some of the segmentation problems and outperforms the current segmentation method namely Saliency Cut method with segmentation accuracy 77.368%, as well as it can be used as a very useful step in improving the performance of visual object categorization system because the region of interest is mostly available.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Non-deterministic Approach for Reliability Evaluation of Steel Beam
...Show More Authors

This paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has be

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Inmateh Agricultural Engineering
DETERMINING THE EFFICIENCY OF A SMART SPRAYING ROBOT FOR CROP PROTECTION USING IMAGE PROCESSING TECHNOLOGY
...Show More Authors

A system was used to detect injuries in plant leaves by combining machine learning and the principles of image processing. A small agricultural robot was implemented for fine spraying by identifying infected leaves using image processing technology with four different forward speeds (35, 46, 63 and 80 cm/s). The results revealed that increasing the speed of the agricultural robot led to a decrease in the mount of supplements spraying and a detection percentage of infected plants. They also revealed a decrease in the percentage of supplements spraying by 46.89, 52.94, 63.07 and 76% with different forward speeds compared to the traditional method.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
EfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficient text in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

The aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 12 2025
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Development of Green Method for Trace Determination of Bendiocarb in Real Samples Using Emerson
...Show More Authors

In this study, cloud point extraction combined with molecular spectrometry as an eco-friendly method is used for extraction, enrichment and determination of bendiocarb (BC) insecticide in different complex matrices. The method involved an alkaline hydrolysis of BC followed Emerson reaction in which the resultant phenol is reacted with 4-aminoantipyrene(4-AAP) in the presence of an alkaline oxidant of potassium ferric cyanide to form red colored product which then extracted into micelles of Triton X-114 as a mediated extractant at room temperature. The extracted product in cloud point layer is separated from the aqueous layer by centrifugation for 20 min and dissolved in a minimum amount of a mixture ethanol: water (1:1) followed

... Show More
View Publication Preview PDF
Crossref (2)
Crossref