Preferred Language
Articles
/
nxeQLZIBVTCNdQwCrafp
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding of image captioning strategies and to survey previous research related to image captioning while examining the most popular databases in different languages, mostly English, translating into other languages using the latest models for describing images, summarizing evaluation measures, and comparing them.

Scopus Crossref
View Publication
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Strategic orientation and its reflection on the Learning organization: Survey study of a sample of Makers decision the Iraqi Ministry of Communications
...Show More Authors

The current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
The preoccupation of mental image in the designs of internal spaces (cinema) is a model
...Show More Authors

The design studies, especially in their contemporary stages, have not been isolated from the subjects that underpin advanced ideas in the field of technical treatments that enrich and improve the social life of users through those technological innovations that have enhanced and changed life styles, Especially in the field of general institutional techniques, including cinemas, as the ideal places for people and visitors to this space, which can contribute to the promotion of cultural, social and technical aspects within this millennium. DONC as reflected on the positive communication and communication between the intellectual and cognitive develop individuals, including cultural and technical side of the individual. The first chapter co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
The Effect of Total Suspended Solids on the Electricity Generation in Microbial Fuel Cell Treating Actual Potato Chips Processing Wastewater
...Show More Authors

This study aimed to investigate the effect of total suspended solids (TSS) on the performance of a continuously operated dual-chamber microbial fuel cell (MFC) proceeded by primary clarifier to treat actual potato chips processing wastewater. The system was also tested in the absence of the primary clarifier and the results demonstrated a significant effect of TSS on the polarization curve of the MFC which was obtained by operating the graphite anodic electrode against Ag/AgCl reference electrode. The maximum observed power and current densities were decreased form 102.42 mW/m2 and 447.26 mA/m2 to 80.16 mW/m2 and 299.10 mA/m2, respectively due to the adverse effect of TSS. Also

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Dec 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of various endodontic irrigants on the sealing ability of Biodentine and other root perforation repair materials (In vitro study)
...Show More Authors

Background: This in vitro study was carried out to evaluate the effect of various endodontic irrigants (sodium hypochlorite, ethylene diaminetetracetic acid and normal saline) on sealing ability of (Biodentine, mineral trioxide aggregate, and amalgam) used to repair furcal perforations. Material and methods: One hundred and twenty extracted human molars with divergent roots were used in this study. A standard root canal access cavity was prepared in each tooth and furcal perforation was made and was standardized by using k file size 100 instrument to get a perforation of (1.32mm) in diameter .The teeth were randomly divided in to three groups of 40 teeth according to the type of material used to repair the perforations (Group A: The furcal

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Effect of Ferric Oxide on Electricity Generation and Waste Water Treatment Using Microbial Fuel Cell Technology
...Show More Authors

The aim of research is to show the effect of Ferric Oxide (Fe2O3) on the electricity production and wastewater treatment, since 2.5% of Ferric Oxide (Fe2O3) (heated and non heated) nanoparticles has been used. Characterization of nanoparticles was done using X-ray Diffraction (XRD) and Scan Electron Microscopy (SEM). The influence of acidity was also studied on both wastewater treatmenton the Chemical Oxygen demand (COD) and Biological Oxygen Demand (BOD) and voltage output was studied. From the results, it was infused that the dosage of 0.025 g/l and an initial pH 7 were founded to be optimum for the effective degradation of effluents. The results concluded that the treatment of anaerobic sludge wastewater using Ferric Oxide (Fe2O3) in

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
Generation of Truly Random QPSK Signal Waveforms for Quantum Key Distribution Systems Based on Phase Coding
...Show More Authors

In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.

View Publication Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus