Preferred Language
Articles
/
jcoeduw-133
Object Filling Using Table Based Boundary Tracking
...Show More Authors

The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, object holes, noise removal, scanning 2D objects.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 19 2026
Journal Name
Al–bahith Al–a'alami
The Boundary between Advertisement and Mass Media Overlapping Levels in the Press (The Case of Iraq)
...Show More Authors

The advertisement is important in maximizing the resources of journalistic institutions. It helps them to perform their duties and also establishes their independence. However, this type of communication has often overlapped with other types of communication, including media and publicity.

Those in charge of the press bear responsibility in this regard, as some of them harness the advertisement for personal purposes; or detrimental to media content. Many communication authorities have drawn attention to the danger of confusing the concepts and levels of the three activities and have moved towards establishing rules to reduce overlap between them.

The aim of this research is to try to disengage the concept of advertising,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Free Vibration Analysis of Laminated Composite Plates with General Boundary Elastic Supports Under Initial Thermal Load
...Show More Authors

Free vibration behavior was developed under the ratio of critical buckling temperature of laminated composite thin plates with the general elastic boundary condition. The equations of motion were found based on classical laminated plate theory (CLPT) while the solution functions consists of trigonometric function and a continuous function that is added to guarantee the sufficient smoother of the so-named remaining displacement function at the boundaries, in this research, a modified Fourier series were used, a generalized procedure solution was developed using Ritz method combined with the imaginary spring technique. The influences of many design parameters such as angles of layers, aspect ratio, thickness ratio, and ratio of initial in-

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mixed convection in an Horizontal Rectangular Duct Including interior Circular Core with Time periodic Boundary Condition
...Show More Authors

Numerical Investigation was done for steady state laminar mixed convection and thermally and hydrodynamic fully developed flow through horizontal rectangular duct including circular core with two cases of time periodic boundary condition, first case  on the rectangular wall while keeping core wall constant and other on both the rectangular duct and core walls. The used governing equations are continuity momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C.) methods. The Finite Difference approach with the Line Successive Over Relaxation (LSOR) method is used to obtain all the computational results the (B.F.C.) method is used to generate th

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Mixed Convection in a Square Cavity Filled with Porous Medium with Bottom Wall Periodic Boundary Condition
...Show More Authors

Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic  pressure sinusoidal  amplitude  range and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Performance of Case-Based Reasoning Retrieval Using Classification Based on Associations versus Jcolibri and FreeCBR: A Further Validation Study
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 22 2022
Journal Name
Arab Science Heritage Journal
منهج الامام زين الدين الرازي في دفع الاشكال في كتابه (اسئلة القرآن المجيد واجوبتها من غرائب آي التنزيل)
...Show More Authors

   God Almighty has prepared for this nation men who made its glory, built its glories, and elevated it to the sublime of its glory, until it was the best nation brought out to people.

Among these notables are those who served the Noble Qur’an, and sacrificed the most precious to reveal its secrets, and to defend the Noble Qur’an against atheists and skeptics, namely Imam (Zain El-Din Muhammad Ibn Abi Bakr Ibn Abd al-Qadir al-Razi, 666 AH), that venerable scholar, and the great sea, who He was known to be: an interpreter, linguistic, jurisprudent, jurisprudence on the Hanafi school of thought. Among his most prominent books are: (Mukhtar Al-Sahah) on language, (Explanation of the Haririya Maqamat) and (Hadiqat al-Ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2016
Journal Name
Australian Journal Of Basic And Applied Sciences
Programming Exam Questions Classification Based On Bloom’s Taxonomy Using Grammatical Rule
...Show More Authors

Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref