Preferred Language
Articles
/
kBfrNY8BVTCNdQwCumK7
Image Classification Using Bag of Visual Words (BoVW)

In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 03 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Publication Date
Sat Apr 15 2023
Journal Name
Journal Of Robotics
A New Proposed Hybrid Learning Approach with Features for Extraction of Image Classification

Image classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class

... Show More
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Reconciliation between Immunity Assessed for the Diplomatic Bag and Considered National Security

The diplomatic bag is one of the important means of communication used by the diplomatic mission to communicate with the government of the sending country and its consulates, as well as the missions in other countries. The diplomatic bag was granted absolute immunity against opening, seizing and inspection in order to effectively perform the function entrusted to it. The practical reality revealed the exploitation of the diplomatic bag to smuggle drugs and shipments of weapons and explosives that harmed the national security of the receiving country. The International Law Committee avoided the matter and reconciled the interest of the immunity of the diplomatic bag with the interest of the state in preserving national security and sovere

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Computational And Theoretical Nanoscience
Controlling of Robot Hand by Using Microcontroller with Visual Basic

The robot arm is the most popular robotic form used in industry. Thus, it is crucial to make a system programming which could controlled the movement of each part in the industrial robot to make it works properly. One of the simplest models of the robot arm is EDARM ED-7100 which has a controller to control the movement of the robot arm manually. In this study, the robot controller has been redesigned in order to improve this robot's function. The new controller system used AT89S52 microcontroller which has wire connected to the robot hand. A function has been added with this controller to improve the system of controlling and becomes better than the previous system (only manually). The functions of the new system include three mo

... Show More
Scopus Crossref
View Publication
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
Scopus (15)
Crossref (6)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Digital Image Analysis versus Visual Scoring for Bcl-2 and P53 Protein Expression in Glioma.

Background: Traditionally, evaluation of the results of immunohistochemistry was done by visual quantification.
Materials and methods: for reliable evaluation, more time-efficient and user friendly method we used simple computer program with image analysis options as independent parameters for reading positive results. To test the validity of visually scored results, we compare and correlate the results of Digital image analysis (DIA) variables with the visual scores of 280 pictures taken from entire stained glioma tumor sections for Bcl-2 and P53 oncoproteins in different glioma tumor grades.
Results: In this study, rates expression of both oncoproteins was evaluated visually in glioma tumor samples (

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Game Programming: Arabic Words Puzzle.

This research shows the design and implementation of a small and simple Arabic word-puzzle game to test the effect of electronic games in enhancing and supporting the traditional learning system. The system based on from the real needs of classrooms in the Iraqi primary schools so the game is designed for primary school students (first and second grade) and this required the exploration of how schools use and teach information. The system is built by using Visual Basic version 6 programming language in conjunction with the Microsoft Office Access 2007, Results show our game based educational program is effective. 14 children (6-7 years old) played the game. The children played through multiple sessions. For each child; this game is usefu

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
Image Classification Schemes Based on Sliced Radial Energy Distribution of DFT and the Statistical Moments of Haar Wavelet

Texture recognition is used in various pattern recognition applications and texture classification that possess a characteristic appearance. This research paper aims to provide an improved scheme to provide enhanced classification decisions and to decrease processing time significantly. This research studied the discriminating characteristics of textures by extracting them from various texture images using discrete Haar transform (DHT) and discrete Fourier transform DFT. Two sets of features are proposed; the first set was extracted using the traditional DFT, while the second used DHT. The features from the Fourier domain are calculated using the radial distribution of spectra, while for those extracted from Haar Wavelet the statistical

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF