Preferred Language
Articles
/
nxazw4sBVTCNdQwCttzz
Object Tracking Using Adaptive Diffusion Flow Active Model
...Show More Authors

Object tracking is one of the most important topics in the fields of image processing and computer vision. Object tracking is the process of finding interesting moving objects and following them from frame to frame. In this research, Active models–based object tracking algorithm is introduced. Active models are curves placed in an image domain and can evolve to segment the object of interest. Adaptive Diffusion Flow Active Model (ADFAM) is one the most famous types of Active Models. It overcomes the drawbacks of all previous versions of the Active Models specially the leakage problem, noise sensitivity, and long narrow hols or concavities. The ADFAM is well known for its very good capabilities in the segmentation process. In this research, it is adopted for segmentation and tracking purposes. The proposed object tracking algorithm is initiated by detecting the target moving object manually. Then, the ADFAM convergence of the current video frame is reused as an initial estimation for the next video frame and so on. The proposed algorithm is applied to several video sequences, different in terms of the nature of the object, the nature of the background, the speed of the object, object motion direction, and the inter-frame displacement. Experimental results show that the proposed algorithm performed very well and successfully tracked the target object in all different cases.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 20 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Apexification and periapical healing of immature teeth using Mineral Trioxide Aggregate
...Show More Authors

Background: Apexification is a method to induce a calcified barrier in a root with an open apex or the continued apical development of an incomplete root in teeth with necrotic pulp. MTA apexification has several advantages such as it neither gets resorbed, nor weakens the root canal dentin, and also sets in the wet environment. The aim of this study is to evaluate the effectiveness of the use of MTA in apexification and periapical healing of teeth with incomplete root formation and periapical infection. Materials and method: Apexification was carried out on fourteen permanent immature teeth of eleven children aged 7-12 years attended the teaching hospital of College of Dentistry, Baghdad University using mineral trioxide aggregate followed

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Optimization of Dye Removal Using Waste Natural Material and Polymer Particles
...Show More Authors

In this paper waste natural material (date seed) and polymer particles(UF) were used for investigation of  removal dye of the potassium permanganate. Also study effect some variables such as pH, dye concentration and adsorbent concentration on dye removal. 15 experimental runs were done using  the itemized conditions designed established on the Box-Wilson design employed to optimize dye removal. The optimum conditions for the dye removal were found: (pH) 12, (dye con.) 2.38 ppm, (adsorbant con.) 0.0816 gm for date seed with 95.22% removal and for UF (pH) 12, (dye con.) 18 ppm, (adsorbant con.) 0.2235 gm with 91.43%. The value of R-square was 85.47%  for Date seed  and (88.77%) for UF.

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Investigate Indian Costus Plasma Parameters using Q-Switched Laser Nd: YAG
...Show More Authors

The Indian costus plasma properties are investigated including electron temperature (Te), "electron density (ne)", "plasma frequency (fp)", " Debye sphere length", and amount of Debye(Nd),  using the spectrum of optical emission technique. There are several energies used, with ranging from 300 to 600 mJ. The Boltzmann Plot is used to calculate the temperature; where as Stark's Line Broadening is used to calculate the electron density. The Indian costus was spectroscopically examined in the air with the laser  at 10 cm away from the target and the optical fiber  at 0.5 cm away. The results were obtained for an electron temperature range of (1.8-2.2) electron volts (ev) and a wavelength range of (300-600) nm. The XRF analysis reveals th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Using typographic patterns in commercial advertising design: عصام إبراهيم محمد الكبيسي
...Show More Authors

Typographic patterns are one of the design elements in commercial advertising for their ability to deliver the message and information to the recipient smoothly and quickly, and it is indicated that there are many different techniques that can use typographic patterns in commercial advertisements, including spacing, spaces between letters, letter height, length, weight, and contrast and this Usage must be studied according to the type of font and how it can be used in advertising campaigns.
Based on the above, the research came to study (employing typographic patterns in commercial advertising design) in which the researcher identified his question for the purpose of reaching a solution to his research problem which is (Is it possible

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Calculating heterogeneity of Majnoon Field/Hartha Reservoir using Lorenz Coefficient method
...Show More Authors
Abstract<p>One of the principle concepts to understand any hydrocarbon field is the heterogeneity scale; This becomes particularly challenging in supergiant oil fields with medium to low lateral connectivity and carbonate reservoir rocks.</p><p>The main objectives of this study is to quantify the value of the heterogeneity for any well in question, and propagate it to the full reservoir. This is a quite useful specifically prior to conducting detailed water flooding or full field development studies and work, in order to be prepared for a proper design and exploitation requirements that fit with the level of heterogeneity of this formation.</p><jats></jats> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Direction of Arrival Estimation of Meteors Echoes using Array Radio Antennas
...Show More Authors

Array antennas have an interesting role in the radio astronomy field. The array antennas allow astronomers to obtain high-resolution signals with high sensitivity to weak signals. This paper estimates the meteors' positions entering the Earth's atmosphere and develops a simulation for array antenna radar to analyze the meteor's echoes. The GNU radio software was used to process the echoes, which is a free open-source software development toolkit that provides signal processing blocks to implement in radio projects. Then, the simulation determines the azimuth and elevation of the meteors. An improved Multiple Signal Classification (MUSIC) algorithm has been suggested to analyze these echoes. The detected power of each meteor echo has

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Nasaq Journal
How Using Punctuation Dominates the Way Written Jokes Can Be Comprehended
...Show More Authors

A joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get

... Show More