The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreAIM: To evaluate the short-term effectiveness of Gamma knife radiosurgery as a modality of treatment of brain arteriovenous malformation. METHODS: Sixty-three patients with arteriovenous brain malformations underwent Gamma knife radiosurgery included in this prospective study between April 2017 and September 2018 with clinical and radiological with MRI follow up was done at three months and six months post-Gamma knife radiosurgery. By the end of the 12th-month post-Gamma knife radiosurgery, the patients were re-evaluated using digital subtraction angiography co-registered with M.R.I. During the 12 months follow up, CT scan or MRI was done at any time if any one of the patients᾽ condition deteriorated or developed signs and s
... Show MoreThe problem of the current research as the Iraqi Drilling Company suffers from the many challenges facing its work as a result of the current conditions in Iraq and the subsequent changes in the policies of the State Which left an impact on its activities and objectives, which created pressure on the importance of an organizational power capable of diagnosing the core competencies and development and maintain them to contribute to the raising and success in the performance of the company. The researchers adopted the method of analytical research and adopted the questionnaire as a main tool in the collection of research data and information . It was distributed to a community of (140) individuals from the low mana
... Show MoreObjective: To assess prospectively functional outcome of interlocked intramedullary nailing fixation in management of closed tibia shaft fractures. Methodology: This prospective study included 134 patients with closed shaft tibia fractures with age 18-60 years and isolated closed fracture of shaft of tibia. The fractures were fixed by interlocking intramedullary nail. At follow-up after 12 months postoperatively, the functional outcome was assessed radiographically for the sign of union and clinically according to Klemm-Borner criteria. Results: The mean age was 38.55 years. Out of 134 patients, 55.2% were male. The cause was road traffic accident in 44.8%, majority of the fracture occur in the mid-shaft (41.8%), and oblique fracture was th
... Show More