Preferred Language
Articles
/
jcoeduw-826
Minimum Spanning Tree Algorithm for Skin Cancer Image Object Detection
...Show More Authors

This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that the
proposedmethod obtained very good results but it requires more testing on different types of Skin
Cancer Images.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 03 2021
Journal Name
Entropy
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials
...Show More Authors

Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the

... Show More
View Publication
Scopus (34)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Symmetry
Fast Overlapping Block Processing Algorithm for Feature Extraction
...Show More Authors

In many video and image processing applications, the frames are partitioned into blocks, which are extracted and processed sequentially. In this paper, we propose a fast algorithm for calculation of features of overlapping image blocks. We assume the features are projections of the block on separable 2D basis functions (usually orthogonal polynomials) where we benefit from the symmetry with respect to spatial variables. The main idea is based on a construction of auxiliary matrices that virtually extends the original image and makes it possible to avoid a time-consuming computation in loops. These matrices can be pre-calculated, stored and used repeatedly since they are independent of the image itself. We validated experimentally th

... Show More
View Publication
Scopus (25)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Multifactor Algorithm for Test Case Selection and Ordering
...Show More Authors

Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The role of monetary policy in reducing inflation in Iraq through monetary sterilization mechanism. post-2003
...Show More Authors

The main objective of the central bank is to achieve price stability and target in fractionates. Therefore, the bank sought to use modern tools and policies in order to reduce the negative effects of the accumulation of foreign reserves represented by monetary sterilization, similar to developed and developing countries alike, but with different available tools that are possible and imposed by the local financial and monetary environments, such as the window for buying and selling foreign currency, open market operations and deposit facilities. And lending existing. Because any in crease in the monetary base resulting from the accumulation of foreign reserves will affect price stability directly due to the consumer nature of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Astronomi cal Color Image Compression Using Multilevel Block Truncation Coding –Modified Vector Quantization Technique
...Show More Authors

A common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
مؤسسة دار الصادق الثقافية
الجامعة ودورها في الحد من تعاطي المخدرات وتأثيرها على المدمنين (اسباب وحلول ومعالجات)
...Show More Authors

ملخص البحث: تعتبر مشكلة تعاطي المخدرات من المشكلات التي تؤثر في بناء المجتمع وأفراده لما يترتب عليها من آثار اجتماعية واقتصادية ونفسية سيئة تنسحب على الفرد و على المجتمع، كما أنها ظاهرة اجتماعية مرضية تدفع إليها عوامل عديدة؛ بعضها يتعلق بالفرد والبعض الآخر بالأسرة والثالث بالبناء الاجتماعي ككل. وتعد ظاهرة انتشار المخدرات من الظواهر الأكثر تعقيدا وبارزة هذه الظاهر ة وإحدى مشكلات العصر، الشاملة في المجتمع، و

... Show More
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of higher Education Institutes in restricting Administrative and Financial Corruption: An Analytic Reading
...Show More Authors

Corruption, in all its categories and forms, is regarded as the nowadays virus which has greatly spread in most institutes and society, a matter that cause a great waste of resources.

      According to the reports of international transparency Institute, Iraq is regarded as one of the greatest countries in corruption.

      Regardless of the reasons and forms of corruption, the retreat in work – values and ethics are the main reasons behind that.

      Being the main source of providing qualified staff "educators" for the working market, the high education institutes face great challenges in standing against corruption inside and outside

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Self-Localization of Guide Robots Through Image Classification
...Show More Authors

The field of autonomous robotic systems has advanced tremendously in the last few years, allowing them to perform complicated tasks in various contexts. One of the most important and useful applications of guide robots is the support of the blind. The successful implementation of this study requires a more accurate and powerful self-localization system for guide robots in indoor environments. This paper proposes a self-localization system for guide robots.  To successfully implement this study, images were collected from the perspective of a robot inside a room, and a deep learning system such as a convolutional neural network (CNN) was used. An image-based self-localization guide robot image-classification system delivers a more accura

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Women's Knowledge about Risk Factors and Early Detection of Breast Cancer at Ibn Rushd College of Education in Baghdad University
...Show More Authors

Objective: Evaluation of women's knowledge about risk factors and early detection of breast cancer at
Ibn Rushd college of education in Baghdad University.
Methodology: The study sample included (184) women in the Ibn Rushd College / University of
Baghdad, whose age ranged between (17-58) years. Data were collected through a structured
questionnaire prepared by the National Cancer Research Center which were answered during a scientific
symposium about breast cancer. The score was calculated by correcting the results of the answer, giving
one score for each correct answer and then estimating the level of knowledge and inputting all data in a
statistical program.
Results: The results showed limited level of women's

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref