Preferred Language
Articles
/
joe-502
Optical Character Recognition Using Active Contour Segmentation
...Show More Authors

Document analysis of images snapped by camera is a growing challenge. These photos are often poor-quality compound images, composed of various objects and text; this makes automatic analysis complicated. OCR is one of the image processing techniques which is used to perform automatic identification of texts. Existing image processing techniques need to manage many parameters in order to clearly recognize the text in such pictures. Segmentation is regarded one of these essential parameters. This paper discusses the accuracy of segmentation process and its effect over the recognition process. According to the proposed method, the images were firstly filtered using the wiener filter then the active contour algorithm could be applied in the segmentation process. The Tesseract OCR Engine was selected in order to evaluate the performance and identification accuracy of the proposed method. The results showed that a more accurate segmentation process shall lead to a more accurate recognition results. The rate of recognition accuracy was 0.95 for the proposed algorithm compared with 0.85 for the Tesseract OCR Engine.      

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Parametric Study of Active Solar Heating Using a Pebble Bed as a Thermal Collector and Storage Unit
...Show More Authors

In this study, pebble bed as an absorber and storage material was placed in a south facing, flat plate air-type solar collector at fixed tilt angle of (45°). The effect of this material and differ- ent parameters on collector efficiency has been investigated experimentally and
theoretically. Two operation modes were employed to study the performance of the solar air heater. An inte- grated mode of continuous operation of the system during the period of (11:00 am – 3:00 pm) and non-integrated mode in which the system stored the solar energy through the day then used the stored energy during the period of (3:00 pm – 8:00 pm). The results of parametric study in case of continuous operating showed that the maximum average temperatur

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ellen Olenska’s Character in Edith Wharton’s The Age of Innocence
...Show More Authors

Old New York was Wharton's term to describe this wealthy and elite class at the top of
the developing city's social hierarchy, a society which was utterly intent on maintaining its
own rigid stability. Even though, the roles of women in American society changed drastically
from 1820’s to 1860’s due to the civil war and such a progression was due in part to the
revolutionary thoughts. Women started taking their right to speak up openly and frankly and
become more like men. The role of many women had changed from being homemaker to
being able to provide for the family by either getting a job or start to be allowed to have a
voice. They had important roles not only in helping the family, but in sharing to rebuild th

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Improving the Direction of Arrival Estimation Using the Parasitic Subspace Generated by Active-Parasitic Antenna (APA) Arrays
...Show More Authors

The improvement in Direction of Arrival (DOA) estimation when the received signals impinge on Active-Parasitic Antenna (APA) arrays will be studied in this work. An APA array consists of several active antennas; others are parasitic antennas. The responses to the received signals are measured at the loaded terminals of the active element. The terminals of the parasitic element are shorted. The effect of the received signals on the parasites, i.e., the induced short-circuit current, is mutually coupled to the active elements. Eigen decomposition of the covariance matrix of the measurements of the APA array generates a third subspace in addition to the traditional signal and noise subspaces generated by the all-active ante

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
MSRD-Unet: Multiscale Residual Dilated U-Net for Medical Image Segmentation
...Show More Authors

Semantic segmentation is an exciting research topic in medical image analysis because it aims to detect objects in medical images. In recent years, approaches based on deep learning have shown a more reliable performance than traditional approaches in medical image segmentation. The U-Net network is one of the most successful end-to-end convolutional neural networks (CNNs) presented for medical image segmentation. This paper proposes a multiscale Residual Dilated convolution neural network (MSRD-UNet) based on U-Net. MSRD-UNet replaced the traditional convolution block with a novel deeper block that fuses multi-layer features using dilated and residual convolution. In addition, the squeeze and execution attention mechanism (SE) and the s

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The artistic treatment of the expatriate character in the fictional film: آسيا جبار خلف
...Show More Authors

Although cinema is moving towards art, it has dealt with the character since the beginning of the discovery of cinematic art in films such as (Doctor Caligari's cabin) and most German expressive films in the third decade of the twentieth century, but the interest of cinema is growing in the estranged human personality, meaning that this character It lives by its alienation from the environment and society that surrounds it, because our present days have witnessed on the material and moral level more social breakdowns such as wars and disasters, and the sharp contradiction in the social and economic level of people themselves or between different societies, or between the individual and his community, and new social relations have increas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Fast Temporal Video Segmentation Based on Krawtchouk-Tchebichef Moments
...Show More Authors

View Publication
Scopus (41)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Optical Communications
Improving the optical link for UVLC using MIMO technique
...Show More Authors
Abstract<p>This paper proposed a theoretical treatment to study underwater wireless optical communications (UWOC) system with different modulation schemes by multiple input-multiple output (MIMO) technology in coastal water. MIMO technology provides high-speed data rates with longer distance link. This technique employed to assess the system by BER, Q. factor and data rate under coastal water types. The reliability of the system is examined by the techniques of 1Tx/1Rx, 2Tx/2Rx, 3Tx/3Rx and 4Tx/4Rx. The results shows the proposed technique by MIMO can get the better performance compared with the other techniques in terms of BER. Theoretical results were obtained to compare between PIN and APD </p> ... Show More
View Publication
Scopus (19)
Crossref (19)
Scopus Crossref