Preferred Language
Articles
/
lxfjPo8BVTCNdQwCwGXX
A New Method for Detecting Cerebral Tissues Abnormality in Magnetic Resonance Images
...Show More Authors

We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). Standard Deviation, Mean, Energy and Entropy are extorted using the histogram approach for each merger space. These features are found to be higher in occurrence in the tumor region than the non-tumor one. MRI scans of the five brains with 60 slices from each are utilized for testing the proposed method’s authenticity. These brain images (230 slices as normal and 70 abnormal) are accessed from the Internet Brain Segmentation Repository (IBSR) dataset. 60% images for training and 40% for testing phase are used. Average classification accuracy as much as 98.02% (training) and 98.19% (testing) are achieved.

Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Remove Reflection Using Wavelet transformation Estimation
...Show More Authors

     Improving the performance of visual computing systems is achieved by removing unwanted reflections from a picture captured in front of a glass. Reflection and transmission layers are superimposed in a linear form at the reflected photographs. Decomposing an image into these layers is often a difficult task. Plentiful classical separation methods are available in the literature which either works on a single image or requires multiple images. The major step in reflection removal is the detection of reflection and background edges. Separation of the background and reflection layers is depended on edge categorization results. In this paper a wavelet transform is used as a prior estimation of background edges to sepa

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Image Content Verification based on DWT and Chaotic Map Watermarking
...Show More Authors

     Image content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.

     In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on  ea

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
...Show More Authors

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Image Compression Using Mapping Transform with Pixel Elimination
...Show More Authors

     In today's world, digital image storage and transmission play an essential role,where images are mainly involved in data transfer. Digital images usually take large storage space and bandwidth for transmission, so image compression is important in data communication. This paper discusses a unique and novel lossy image compression approach. Exactly 50% of image pixels are encoded, and other 50% pixels are excluded. The method uses a block approach. Pixels of the block are transformed with a novel transform. Pixel nibbles are mapped as a single bit in a transform table generating more zeros, which helps achieve compression. Later, inverse transform is applied in reconstruction, and a single bit value from the table is rem

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Arabic Cyberbullying Detection Using Support Vector Machine with Cuckoo Search
...Show More Authors

      Cyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Integration Remote Sensing and GIS Techniques to Evaluate Land Use-Land Cover of Baghdad Region and Nearby Areas
...Show More Authors

The study area of Baghdad region and nearby areas lies within the central part of the Mesopotamia plain. It covers about 5700 Km2. The remote sensing techniques are used in order to produce possible Land Use – Land Cover (LULC) map for Baghdad region and nearby areas depending on Landsat TM satellite image 2007. The classification procedure which was developed by USGS used and followed with field checking in 2010. Land Use-land cover digital map is created depending on maximum likelihood classifications (ML) of TM image using ERDAS 9.2.The LULC raster image is converted to vector structure, using Arc GIS 9.3 Program in order to create a digital LULC map. This study showed it is possible to produce a digital map of LULC and it can be co

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Notes On The Non Linear Operator Equation I AXAX n  *
...Show More Authors

  Necessary and sufficient conditions for the operator equation I AXAX n  * , to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.

View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Raman Scattering Enhancement by silver Nanostructures Prepared by Electrical Exploding Wire Technique
...Show More Authors

This project aims to fabricate nanostructures (AgNPS) using the  electrical exploding wire (EEW) technique using Rhodamine 6G dye as the probe molecule, investigate the effect of AgNPS on the absorption spectra and surface-enhanced Raman scattering (SERS) activities, and advance  using porous silicon as an active substrate for surface-enhanced Raman scattering (SERS). X-Ray diffraction (XRD) was used to investigate the structural properties of the nanostructures (AgNPs). Field emission scanning electron microscopy (FE-SEM) was used to investigate surface morphology. A double beam UV-Vis Spectrophotometer was used to analyze the mixed R6G laser dye(of concentration 1x  M)  absorption spectra with the nanostructures AgNPS (of concentra

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref