Preferred Language
Articles
/
vxcgP48BVTCNdQwCbmWr
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present study proposes the use of a hybrid image segmentation technique to acquire precise segmentation outcomes, while engaging “Alpha Shape (α-Shape)” in supposition to derive the original contour, followed by a refining process through engaging a conventional active contour model. Empirical results show high potential in the suggested computational method. Trials indicate that the primary contour is capable of being precisely set next to the objective contour and effectively have these objective contours extracted, devoid of any contour instigation. Some of the benefits associated with the novel hybrid contour include minimized cost of computation, enhanced anti-jamming capability, as well as enlarged utilization array of snake model.

Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Generation of True Random TTL Signals for Quantum Key-Distribution Systems Based on True Random Binary Sequences
...Show More Authors

A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems

View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Room temperature flexible sensor based on F-MWCNT modified by polypyrrole conductive polymer for NO2 gas detection
...Show More Authors

This project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
PVC Polymeric Membranes Coated Graphite Electrodes Based on Molecularly Imprinted Polymers for the Selective Determination of Glibenclamide
...Show More Authors

Graphite coated electrodes (GCE) based on molecularly imprinted polymers were fabricated for the selective potentiometric determination of Glibenclamide (Glb). The molecularly imprinted (MIP) and nonimprinted (NIP) polymers were synthesized by radical bulk polymerization using (Glb.) as a template, acrylic acid (AA) and acrylamide (AAm) as monomers, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The imprinted membranes and the non-imprinted membranes were prepared using dioctyl phthalate (DOP) and Dibutylphthalate (DBP) as plasticizers in PVC matrix. The membranes were coated on graphite electrodes. The MIP electrodes using (AA) and (AAm) showed a near nernstian response with slopes o

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Design of an Adaptive PID Neural Controller for Continuous Stirred Tank Reactor based on Particle Swarm Optimization
...Show More Authors

 A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.

View Publication Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Tapered Splicing Points SMF-PCF-SMF Structure based on Mach-Zehnder interferometer for Enhanced Refractive Index Sensing
...Show More Authors

Photonic crystal fiber interferometers (PCFIs) are widely used for sensing applications. This work presented solid core-PCFs based on Mach-Zehnder modal interferometer for sensing refractive index. The general structure of sensor was applied by splicing short lengths of PCF in both sides with conventional single mode fiber (SMF-28).To apply modal interferometer theory collapsing technique based on fusion splicing used to excite higher order modes (LP01 and LP11). A high sensitive optical spectrum analyzer (OSA) was used to monitor and record the transmitted wavelength. This work studied a Mach-Zahnder interferometer refractive index sensor based on splicing point tapered SMF-PCF-SMF. Relation between refractive index sensitivity and tape

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet-Based Feature Extraction for Cassava Classification: A Machine Learning Approach
...Show More Authors

Cassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Electric Power Systems Research
Analytical and measurement-based wideband two-port modeling of DC-DC converters for electromagnetic transient studies
...Show More Authors

Power-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref