Preferred Language
Articles
/
uhZcn4oBVTCNdQwC9KGO
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CNN infrastructure. Findings: The results acquired through the investigated CBIR system alongside the benchmarked results have clearly indicated that the suggested technique had the best performance with the overall accuracy at 88.29% as opposed to the other sets of data adopted in the experiments. The outstanding results indicate clearly that the suggested method was effective for all the sets of data. Improvements/Applications: As a result of this study, it was found the revealed that the multiple image representation was redundant for extraction accuracy, and the findings from the study indicated that automatically retrieved features are capable and reliable in generating accurate outcomes.

Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (54)
Crossref (50)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Tuning PID Controller by Neural Network for Robot Manipulator Trajectory Tracking
...Show More Authors

Ziegler and Nichols proposed the well-known Ziegler-Nichols method to tune the coefficients of PID controller. This tuning method is simple and gives fixed values for the coefficients which make PID controller have weak adaptabilities for the model parameters variation and changing in operating conditions. In order to achieve adaptive controller, the Neural Network (NN) self-tuning PID control is proposed in this paper which combines conventional PID controller and Neural Network learning capabilities. The proportional, integral and derivative (KP, KI, KD) gains are self tuned on-line by the NN output which is obtained due to the error value on the desired output of the system under control. The conventio

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the theoretical framework of the REA accounting model Used in the design of accounting information systems
...Show More Authors

Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The image of the soldier in contemporary Iraqi painting
...Show More Authors

The research tagged (the image of the soldier in contemporary Iraqi painting) dealt with the concept of the image as one of the basic concepts in the creative achievement, whether it is in the field of art, literature or beauty. Therefore, the concept of the image expanded to express the various aspects of human creativity, including the field of painting. To know the image of the soldier in contemporary Iraqi painting, the research included four chapters. The first chapter focused on the methodological framework of the research, while the second chapter included three sections. The first topic dealt with the philosophical and artistic concept of the image. The second topic was concerned with the representations of the soldier's image in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Computing And Digital Systems
Human Identification Based on SIFT Features of Hand Image
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Dec 18 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The value of lateral cephalometric image in sex identification
...Show More Authors

Background: Determination of sex and estimation of stature from the skeleton is vital to medicolegal investigations. Skull is composed of hard tissue and is the best preserved part of skeleton after death, hence, in many cases it is the only available part for forensic examination. Lateral cephalogram is ideal for the skull examination as it gives details of various anatomical points in a single radiograph. This study was undertaken to evaluate the accuracy of digital cephalometric system as quick, easy and reproducible supplement tool in sex determination in Iraqi samples in different age range using certain linear and angular craniofacial measurements in predicting sex. Materials and Method The sample consisted of 113of true lateral cepha

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Analysing of Hueckel Edge Detector Performance Using Satellite Image
...Show More Authors

In this research, an analysis for the standard Hueckel edge detection algorithm behaviour by using three dimensional representations for the edge goodness criterion is presents after applying it on a real high texture satellite image, where the edge goodness criterion is analysis statistically. The Hueckel edge detection algorithm showed a forward exponential relationship between the execution time with the used disk radius. Hueckel restrictions that mentioned in his papers are adopted in this research. A discussion for the resultant edge shape and malformation is presented, since this is the first practical study of applying Hueckel edge detection algorithm on a real high texture image containing ramp edges (satellite image).

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Emerging Trends Technology In Computer Science
A survey of similarity measures in web image search
...Show More Authors