Preferred Language
Articles
/
zhiHlJUBVTCNdQwCuXxB
Deep Learning and Fusion Techniques for High-Precision Image Matting:
...Show More Authors

General Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k dataset demonstrate superior performance compared to traditional methods, achieving higher accuracy, faster processing speed, and improved boundary preservation. Novelty: The proposed model effectively combines deep learning with fusion techniques, enhancing matting quality while maintaining robustness across various environmental conditions. Implications: These findings highlight the potential of integrating fusion techniques with deep learning for image matting, offering valuable insights for future research in automated image processing applications, including augmented reality, gaming, and interactive video technologies. Highlights:   Better Precision: Fusion techniques enhance fine detail preservation. Faster Processing: Lightweight U-Net improves speed and accuracy. Wide Applications: Useful for AR, gaming, and video processing.   Keywords: Deep image matting, computer vision, deep learning, fusion techniques, U-Net

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Wed May 14 2025
Journal Name
Modern Sport
Precision tracking and visual animation and its relationship to the results of the competition with the Sabre Players.
...Show More Authors

In order to get advanced results, we must stand at the pointsthat have been observed by the trainers that are of significance inthe sport of fencing and concern for capacity optical (traceoptical and precision visual animation), so we must learn some ofthese types of capacity, whichever is more influential in the gamefencing so that they add a new axis to the player to pick andchoose in order to achieve the desired goal and raise the level ofthe game.The study aimed to identify the relationship between the visualtracking and accuracy of visual animated face and the results ofcompetitions Sabre of the other.Used a much more descriptive approach to study relational on asample of players clubs Sabre and the way intentional, whoqualified to the

... Show More
View Publication
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 04 2022
Journal Name
Baghdad Science Journal
Fusion Reaction Study of some Selected Halo Systems
...Show More Authors

The challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum ⟨L⟩ for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A quantum Coupled-Channel Calculations are performed using CC code. The predictions of quantum mechanical approach are comparable with the measured data that is

... Show More
Publication Date
Thu Feb 20 2020
Journal Name
Iraqi Poultry Sciences Journal
A precision use of thermostat in livestock monitoring system in a poultry house
...Show More Authors

Nowadays, many new technologies developed in a lot of countries. These technologies are promising in many areas such as environmental monitoring, precision agriculture as well as in animal production. The purpose of this study was to define a better understanding of how new and advanced technologies affect the agriculture and livestock sector alike. Although agriculture and animal husbandry are among the most important sectors, advanced equipment and information technology cannot be used adequately. This situation leads to low production efficiency. It is also known that there can be a significant difference in temperature between the position of the climate control sensor (room temperature) and the area occupied by the animal. This study e

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Database for Baghdad Soil Using GIS Techniques
...Show More Authors

teen sites Baghdad are made. The sites are divided into two groups, one in Karkh and the other in Rusafa. Assessing the underground conditions can be occurred by drilling vertical holes called exploratory boring into the ground, obtaining soil (disturbed and undisturbed) samples, and testing these samples in a laboratory (civil engineering laboratory /University of Baghdad). From disturbed, the tests involved the grain size analysis and then classified the soil, Atterberg limit, chemical test (organic content, sulphate content, gypsum content and chloride content). From undisturbed samples, the test involved the consolidation test (from this test, the following parameters can be obtained: initial void ratio eo, compression index cc, swel

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Applied Mechanics And Materials
Artistic Techniques for Developing Creativity in Design
...Show More Authors

The design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Signal Processing Techniques for Robust Spectrum Sensing
...Show More Authors

Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper ,

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
International Research Journal Of Engineering And Technology
A POWERFUL AUTOMATED IMAGE INDEXING AND RETRIEVAL TOOL FOR SOCIAL MEDIA Sample
...Show More Authors

The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst

... Show More
Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Joint Conference On Neural Networks (ijcnn)
A Fast Feature Extraction Algorithm for Image and Video Processing
...Show More Authors

View Publication
Scopus (38)
Crossref (38)
Scopus Clarivate Crossref