Preferred Language
Articles
/
jih-451
Arabic Characters Recognition by Edge Detection Using Connected Component Contour(CO3)
...Show More Authors

  In the present paper, Arabic Character Recognition  Edge detection method based on contour and connected components  is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content.         The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .          The third stage the euclidean distance and vector angle are combined by using a saturation-based combination for edge detection using connected component Contour(CO3) for each character.  The system has been tested on MATLAB environment with satisfactory results. Given a better device the result should increase in accuracy significantly. Fonts show that the accuracy of the proposed method is 97.4% correct characters identification in average. The contour code technique seems to be very promising producing top results. The experimental results confirm the effectiveness of the proposed algorithm.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Multi – Linear in Multiple Nonparametric Regression , Detection and Treatment Using Simulation
...Show More Authors

             It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determination of Manganese (II) using Flow Injection Analysis with Chemiluminescence detection
...Show More Authors

The determination of manganese (II) using flow injection analysis with chemiluminescence detection was investigated. Mn2+ in sample solutions injected into a carrier stream of sodium bismuthate (NaBiO3) were oxidised to form MnO4- ions which were capable of producing luminescence after reaction with luminol/KOH in a flow cell. The linear range of the system is from 20 to 80 mg/L with a detection limit 8 mg/L. The proposed system is suitable for determination of Mn2+ in steel alloys after dissolution, filtration and dilution at a rate of approximately 60 samples per hour with a relative standard deviation (RSD)1.2%. Statistical comparison between the proposed system and standard spectrophotometric method revealed that there is no signific

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (12)
Crossref (8)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Detection of Suicidal Ideation on Twitter using Machine Learning & Ensemble Approaches
...Show More Authors

Suicidal ideation is one of the most severe mental health issues faced by people all over the world. There are various risk factors involved that can lead to suicide. The most common & critical risk factors among them are depression, anxiety, social isolation and hopelessness. Early detection of these risk factors can help in preventing or reducing the number of suicides. Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. This paper presents a methodology and experimentation using social media as a tool to analyse the suicidal ideation in a better way, thus helping in preventing the chances of being the victim o

... Show More
View Publication Preview PDF
Scopus (41)
Crossref (28)
Scopus Clarivate Crossref