Preferred Language
Articles
/
bsj-8177
Indoor/Outdoor Deep Learning Based Image Classification for Object Recognition Applications
...Show More Authors

With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor sets, resulting in four trained models. The test sets are used to evaluate the trained models using many evaluation metrics (accuracy, TPR, FNR, PPR, FDR). Results of Google Net model indicate the high performance of the designed models with 99.34% and 99.76% accuracies for indoor and outdoor datasets, respectively. For Mobile Net models, the result accuracies are 99.27% and 99.68% for indoor and outdoor sets, respectively. The proposed methodology is compared with similar ones in the field of object recognition and image classification, and the comparative study proves the transcendence of the propsed system.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 09 2022
Journal Name
كتاب وقائع المؤتمر العلمي الدولي الثاني للعلوم الانسانية والاجتماعية / جامعة فردوسي مشهد
بقاء اثر التعلم بين التعليم الالكتروني والتعليم الحضوري في الرياضيات (دراسة مقارنة)
...Show More Authors

المستخلص: يهدف البحث الى التعرف على بقاء اثر المعلومة عن طريق الاجابة عن السؤال: ما مدى بقاء اثر التعلم بين التعليم الالكتروني والتعليم االحضوري ؟ تم تطبيق البحث في العام الدراسي( 2020-2021 م) في العراق. تم استخدام المنهج الوصفي بالاسلوب المقارن في عقد مقارنة بين التعليم الالكتروني والتعليم الحضوري. وكان مجتمع البحث من طلبة المرحلة الرابعة كلية التربية للعلوم الصرفة – ابن الهيثم ,و العيتة من قسم الرياضيات الم

... Show More
Preview PDF
Publication Date
Fri May 29 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Image Fusion Techniques: A Review
...Show More Authors

Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH

... Show More
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Polynomial image compression: A review
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Visual image in Farzdaq hair
...Show More Authors

The research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.

View Publication Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Orthogonal polynomial embedded image kernel
...Show More Authors

View Publication
Scopus (28)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
التعلم ألمنظمي وأثره في نجاح المنظمات دراسة ميدانية في شركات وزارة الأعمار والإسكان في العراق
...Show More Authors

 

The world witness quality jumps under radical change in the management and work styles, through adopting organizational learning as a process of continuous improvements in response to environmental stimulus, in the knowledge age and turbulent competitive environment the organizational success concept is shift from the view narrow for financial performance and marketshare to long term view which focus on building strategic capabilities that provide a sustainable competitive advantage.

Considering the strategic role assumed for the companies of the Ministry of Construction and Housing to play it, these companies have been chosen to be the field in which questions of th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of Educational And Psychological Researches
التعلم التعاوني وأثره على التحصيل والاتجاه نحو الحاسب الآلي عند طلبة كلية التربية بجامعة بغداد
...Show More Authors

هدفت هذه الدراسة إلى مقارنة أثر أسلوب التعلم التعاوني بالأسلوب التقليدي في التحصيل الدراسي، وعلاقته بالاتجاه نحو الحاسب الآلي عند طلبة كلية التربية بجامعة بغداد خلال دراستهم لمقرر الحاسب الآلي وقد تضمنت إجراءات الدراسة استخدام الأسلوب التجريبي، وذلك بتوزيع أربع شعب دراسية على مجموعتين: "مجموعة تجريبية" يتم تدريسها باستخدام أسلوب التعلم التعاوني، والمجموعة الثانية: "مجموعة ضابطة" يتم تدريسها بالطريق

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 02 2026
Journal Name
Al–bahith Al–a'alami
THE EFFECT OF FASHIONISTA ON FEMALE BODY IMAGE
...Show More Authors

The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref