Preferred Language
Articles
/
vxcgP48BVTCNdQwCbmWr
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present study proposes the use of a hybrid image segmentation technique to acquire precise segmentation outcomes, while engaging “Alpha Shape (α-Shape)” in supposition to derive the original contour, followed by a refining process through engaging a conventional active contour model. Empirical results show high potential in the suggested computational method. Trials indicate that the primary contour is capable of being precisely set next to the objective contour and effectively have these objective contours extracted, devoid of any contour instigation. Some of the benefits associated with the novel hybrid contour include minimized cost of computation, enhanced anti-jamming capability, as well as enlarged utilization array of snake model.

Publication Date
Fri Mar 25 2022
Journal Name
Journal Of The College Of Basic Education
Semantic image coding in contemporary Theatrical performance
...Show More Authors

تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Color Image Compression of Inter-Prediction Base
...Show More Authors

Publication Date
Thu Oct 01 2009
Journal Name
Saudi Med J
The frequency of 21-alpha hydroxylase enzyme deficiency and related sex hormones in Iraqi healthy male subjects versus patients with acne vulgaris
...Show More Authors

KE Sharquie, AA Noaimi, BO Saleh, ZN Anbar…, Saudi Med J, 2009 - Cited by 13

View Publication
Scopus (8)
Scopus
Publication Date
Wed Jul 27 2022
Journal Name
International Journal Of Health Sciences
Detection of coxsackie virus B and measurement level of Tumor necrosis factor alpha in patients suffered in T1DM with coxsackie virus infection
...Show More Authors

Objective. Infection with Coxsackie virus. This virus that damages pancreatic cells, has long been linked to the onset of insulin-dependent diabetic mellitus (IDDM). Pro-inflammatory cytokines can be produced as a result of this illness. Tumor necrosis factor-a is one of these pro-inflammatory cytokines. Materials and Methods. Blood sample were collected from 180 Iraqi participants. Ninety of them is type 1 diabetic patients and other 90 is healthy control .both groups were tested for the incidence of Coxsackie virus B IgG. So the patients groups is divided to two groups according to sero positivity of CVB-IgG .all 180 patients tested to measure of level of TNF-α. Results. The Results showed increasing in levels of TNF-α in CBV po

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Changes in Serum Levels of Tumor Necrosis Factor-Alpha and Antioxidant status in Different Stages of Malignant Prostate Cancer Patients in Iraq
...Show More Authors

Chronic inflammation can induce proliferative events and posttranslational DNA modifications in prostate tissue through oxidative stress. The present study was designed to evaluate the changes in serum levels of TNF-α, malomdialdehyde (MDA) and total antioxidant status (TAS) patients with different stages of malignant prostatic cancer (PCa) and benign prostatic hyperplasia (BPH). One hundred males (age range of 58-72 years) with different stages of malignant PCa were recruited from the Radiotherapy and Nuclear Medicine Teaching Hospital in Baghdad during the period from September 2010 to April 2011. The patients were categorized according to the 4 disease stages (I, II, III, and IV); 25 patients with benign prostatic hyperplasia (BPH)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref