Preferred Language
Articles
/
rhh0iZQBVTCNdQwCGxw-
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 03 2022
Journal Name
Al-kut University College Of Humanities
Deep understanding skills in chemistry among middle school students
...Show More Authors

Preview PDF
Publication Date
Tue Mar 02 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education
Deep understanding skills and their relationship to mathematical modelling among fifth grader
...Show More Authors

Abstract: The aim of the current research is to identify (the relationship between deep understanding skills and mathematical modeling among fifth grade students) the research sample consisted of (411) male and female students of the fifth grade of biology distributed over the General Directorates of Education in Baghdad / Al-Rusafa / 2 / and Al-Karkh / 1 /, and two research tools were built: 1- A test of deep understanding skills, consisting of (20) test items and a scale for two skills. 2- The second test consists of (24) test items distributed among (18) essay items and (6) objective items. The psychometric properties of validity, stability, discriminatory strength, and effectiveness of alternatives were verified for the two tests fo

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technologyā€¸
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Fast Temporal Video Segmentation Based on Krawtchouk-Tchebichef Moments
...Show More Authors

View Publication
Scopus (40)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
Proposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Comparison of Different DEM Generation Methods based on Open Source Datasets
...Show More Authors

Digital Elevation Model (DEM) is one of the developed techniques for relief representation.  The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kriging, IDW (inver

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours
...Show More Authors

View Publication
Crossref (3)
Crossref