Preferred Language
Articles
/
ijp-951
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Agriculture (pol'nohospodárstvo)
Molecular detection of ‘<i>Candidatus</i> Phytoplasma australasia’ and ‘<i>Ca.</i> P. cynodontis’ in Iraq
...Show More Authors
Abstract<p>The association of phytoplasma was investigated in symptomatic tomato (<italic>Solanum lycopersicum</italic> L.), eggplant (<italic>Solanum melongen</italic> L.), mallow (<italic>Malva</italic> spp.) and Bermuda grass (<italic>Cynodon dactylon</italic> L.) plants exhibiting witches’ broom and white leaf diseases, respectively. Total DNA was extracted from tomato (n=3), eggplant (n=2), mallow (n=2) and Bermuda grass (n=8) samples. Direct polymerase chain reaction (PCR) was performed using P1/P7 primer set, then PCR products were sequenced. Sequences obtained from tomato, eggplant and mallow shared 99% maximum nucleotide identity with phytoplasm</p> ... Show More
View Publication
Scopus (12)
Crossref (2)
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Practical comparation of the accuracy and speed of YOLO, SSD and Faster RCNN for drone detection
...Show More Authors

Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers And Electronics In Agriculture
Detection of charcoal rot (Macrophomina phaseolina) toxin effects in soybean (Glycine max) seedlings using hyperspectral spectroscopy
...Show More Authors

View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2008
Journal Name
The Third International Conference On Mathematical Sciences
On Solvability of an Operator Equation
...Show More Authors

Publication Date
Wed Aug 01 2007
Journal Name
University Of Baghdad, College Of Education For Pure Science (ibn Al-haitham), Department Of Mathematical
Thesis.On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Debt swaps An Islamic Economic Evaluation
...Show More Authors

Introduction:

        Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 29 2019
Journal Name
Selected Topics In Facial Nerve Disorders
Introductory Chapter: Facial Nerve - An Overview
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
Large Epigastric Hernia: an Unusual Presentation
...Show More Authors

We presented here a 65years old lady with an unusual presentation of a large epigastric hernia of twenty years duration .The swelling was occupying all the right hypochondrial region .The diagnosis was made on r^E^a-operative identification of the defect in the linea alba which wassutured after removal of the hernial sac and its contents .The postoperative course was uneventful and the patient remained with no complications or recurrence for more than two years follow up.

View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref