Preferred Language
Articles
/
jcoeduw-983
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 06 2018
Journal Name
Digest Journal Of Nanomaterials And Biostructures
HIGHER PHOTO SENSITIVITY OF Co-Y-OXIDE NANO STRUCTURE SYNTHESIZED BY HYDROTHERMAL METHOD
...Show More Authors

In this work, Co-Y-oxide Nano Structure is successfully synthesized via hydrothermal method. The XRD analysis, SEM analysis, optical, electrical and photo sensing properties have been investigated for Co3O4 and Co-Y-oxide thin films. The X-ray diffraction (XRD) analysis reveals that all films are polycrystalline in nature, having cubic structure. The SEM images of thin films clearly indicates that Co3O4 possesses nanosphere like structure and flower like for Co-Y-oxide. The optical properties show that the optical energy gap follows allowed direct electronic transition calculated using Tauc equation and it increases for Co-Y-oxide. The photo sensing properties of thin films are investigated as a function of time at different wavelengths to

... Show More
Scopus (4)
Scopus
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Application of Multi-Objective Optimization on the basis of Ratio Analysis (MOORA) Method
...Show More Authors

The paper aims is to solve the problem of choosing the appropriate project from several service projects for the Iraqi Martyrs Foundation or arrange them according to the preference within the targeted criteria. this is done by using Multi-Criteria Decision Method (MCDM), which is the method of Multi-Objective Optimization by Ratios Analysis (MOORA) to measure the composite score of performance that each alternative gets and the maximum benefit accruing to the beneficiary and according to the criteria and weights that are calculated by the Analytic Hierarchy Process (AHP). The most important findings of the research and relying on expert opinion are to choose the second project as the best alternative and make an arrangement acco

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Advances In Condensed Matter Physics
Electrical and Optical Properties of :H Thin Films Prepared by Thermal Evaporation Method
...Show More Authors

Thin a-:H films were grown successfully by fabrication of designated ingot followed by evaporation onto glass slides. A range of growth conditions, Ge contents, dopant concentration (Al and As), and substrate temperature, were employed. Stoichiometry of the thin films composition was confirmed using standard surface techniques. The structure of all films was amorphous. Film composition and deposition parameters were investigated for their bearing on film electrical and optical properties. More than one transport mechanism is indicated. It was observed that increasing substrate temperature, Ge contents, and dopant concentration lead to a decrease in the optical energy gap of those films. The role of the deposition conditions on value

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Collection, Storage and Protein Extraction Method of Gingival Crevicular Fluid for Proteomic Analysis
...Show More Authors

Gingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Computational Science
Novel approximate solution for fractional differential equations by the optimal variational iteration method
...Show More Authors

View Publication
Crossref (45)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Computational Science
Novel approximate solution for fractional differential equations by the optimal variational iteration method
...Show More Authors

Crossref (45)
Clarivate Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref