Preferred Language
Articles
/
jbcd-1745
Computer Assisted Immunohistochemical Score Prediction Via Simplified Image Acquisition Technique
...Show More Authors

Background: techniques of image analysis have been used extensively to minimize interobserver variation of immunohistochemical scoring, yet; image acquisition procedures are often demanding, expensive and laborious. This study aims to assess the validity of image analysis to predict human observer’s score with a simplified image acquisition technique. Materials and methods: formalin fixed- paraffin embedded tissue sections for ameloblastomas and basal cell carcinomas were immunohistochemically stained with monoclonal antibodies to MMP-2 and MMP-9. The extent of antibody positivity was quantified using Imagej® based application on low power photomicrographs obtained with a conventional camera. Results of the software were employed to predict human visual scoring results with stepwise multiple regression analysis. Results: the overall prediction of epithelial score depicted as r square value was 0.26 (p<0.001) which was obviously higher than that of stromal score (0.10; p<0.01). Epithelial and stromal MMP-2 score prediction was generally higher than that of MMP-9. Collectively, ameloblastomas had a more efficient score prediction compared to basal cell carcinomas. Conclusion: there is a considerable variability in the prediction capacity of the technique with respect to different antibodies, different tumors and cellular versus stromal score.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (11)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Oil spill classification based on satellite image using deep learning techniques
...Show More Authors

 An oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The aesthetic effect of vocal recitation in building the theatrical image
...Show More Authors

Between the duality of sound and image, the completeness of the actor’s personality at the director comes to announce the birth of the appropriate theatrical role for that character as the basic and inherent element of the artwork, within his working system in the pattern of vocal behavior as well as motor/signal behavior as he searches for aesthetic and skill proficiency at the same time.
This is done through the viewer’s relationship with the theatrical event, which the director considers as an area of active creative activity in relation to (the work of the actor) through vocal recitation and the signs it broadcasts in order to fulfill the requirements of the dramatic situation and what it requires of a visual vision drawn in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
MSRD-Unet: Multiscale Residual Dilated U-Net for Medical Image Segmentation
...Show More Authors

Semantic segmentation is an exciting research topic in medical image analysis because it aims to detect objects in medical images. In recent years, approaches based on deep learning have shown a more reliable performance than traditional approaches in medical image segmentation. The U-Net network is one of the most successful end-to-end convolutional neural networks (CNNs) presented for medical image segmentation. This paper proposes a multiscale Residual Dilated convolution neural network (MSRD-UNet) based on U-Net. MSRD-UNet replaced the traditional convolution block with a novel deeper block that fuses multi-layer features using dilated and residual convolution. In addition, the squeeze and execution attention mechanism (SE) and the s

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The Compact city and urban image of the traditional city center
...Show More Authors
Abstract<p>The traditional city suffers from the decline of the urban image due to urban development and homogeneity with the urban context of the city, and because of the lack of determinants governing the urban image, it is that the center of the city of traditional Kadhimiya suffers from a break in the urban image, Therefore, the research included how to build a distinctive urban image of the center of the traditional city of Kadhimiya and achieve the visual pleasure and comfort of the recipient and the urban image here means is an image not picture which are related to several aspects, including physical, social and psychological as well as the collective memory of individuals and their rela</p> ... Show More
View Publication
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology &amp; Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 09 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Daniel's Model on the Acquisition of Concepts for the Arabic Language Curricula Among the Students of Department of Arabic Language in Colleges of Basic Education
...Show More Authors

The current research aims to investigate the effect of a specimen of Daniel in the acquisition of concepts for the Arabic language curricula material to the students of the third phase of the Faculty of Basic Education Department of Arabic Language. The sample consists of (93) applications and a student of (47) students in the Division (A), which represents the experimental group which studied the use of a specimen of Daniel, and (46) students in the Division (B), which represents the control group, which studied the traditional way. The subject of unified two groups, which subjects the Arabic language curricula which includes six chapters.
The duration of the experiment is a full semester. The researchers also prepared a tool for mea

... Show More
View Publication Preview PDF