Preferred Language
Articles
/
rhh0iZQBVTCNdQwCGxw-
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 11 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity
...Show More Authors

The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
The 4th International Virtual Conference In Educational And Human Sciences, Arts, And Languages
Measuring Situational Language Teaching to English Student's Speaking in Private Schools
...Show More Authors

English teachers in Iraq and other countries around the world up to this time use traditional methods to help students memorize new vocabularies. The sense of words or structure is not to be given in either the native tongue or the target language by definition, but is induced by the way the form is used in the situation. Situational Language Teaching (SLT) has recently become the needed method for improving speaking skills. It indicates the application of learning the language in actual and social exchange expressions so as to let learners do as required in classroom and non-classroom circumstances. This pilot study seeks to answer the following questions: Can SLT improve English speaking skills of target learners? How SLT contribute to th

... Show More
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Effect of Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar
...Show More Authors

The current paper aims at knowing the effect of  Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar.

The current paper is confined to a sample of  Basic 7th Class Female Students-  Khaniqin –belonged Morning schools for the academic year 2014-2015 . The sample amounted 50 female students  distributed on two sections ( A,B) . Section A represented  experimental group ( 24) female  students  studied according to the exemplar of ( Wettli) and (B) represented control group (26) female students who have studied with traditional method. The researcher has qualified between these two groups  b

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 10 2023
Journal Name
Current Microbiology
Influence of Light Color on Power Generation and Microalgae Growth in Photosynthetic Microbial Fuel Cell with Chlorella Vulgaris Microalgae as Bio-Cathode
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
The Multifunctional Morphemes in Kurdish Language the Morpheme Le as an example
...Show More Authors

Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses

... Show More
Preview PDF
Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF