Page 67 - IJEEE-2022-Vol18-ISSUE-1
P. 67

Hussein & Ali                                                                                                                    | 63

                            REFERENCES                         and K. H. Maier-Hein, “Brain tumor segmentation and

[1] K. H. Ali and T. Wang, “Learning features for action       radiomics survival prediction: Contribution to the brats
 recognition and identity with deep belief networks,” in       2017 challenge,” in International MICCAI Brainlesion
                                                               Workshop, 2017, pp. 287–297.
 2014 International Conference on Audio, Language and
 Image Processing, 2014, pp. 129–132.                         [16] M. K. Hussein, K. R. Hassan, and H. M. Al-Mashhadi,
[2] J. Marshall, “Learning with technology,” Evid. that        “The quality of image encryption techniques by reasoned
                                                               logic,” TELKOMNIKA, vol. 18, no. 6, pp. 2992–2998,
 Technol. can, does, Support Learn., 2002.
[3] F. Milletari, N. Navab, and S.-A. Ahmadi, “V-net:          2020.
                                                              [17] M. K. Hussein, A. J. Jalil, and A. Alhijaj, “Face
 Fully convolutional neural networks for volumetric medical
 image segmentation,” in 2016 fourth international             Recognition Using The Basic Components Analysis
 conference on 3D vision (3DV), 2016, pp. 565–571.             Algorithm,” in IOP Conference Series: Materials Science
[4] O. Ronneberger, P. Fischer, and T. Brox, “U-net:
                                                               and Engineering, 2020, vol. 928, no. 3, p. 32010.
 Convolutional networks for biomedical image                  [18] M. K. Hussein, “The optimum encryption method for
 segmentation,” in International Conference on Medical         image compressed by AES,” GSJ, vol. 8, no. 4, 2020.
                                                              [19] H. A. Ali, A. J. Jalil, and M. K. Hussein, “Vernam
 image computing and computer-assisted intervention,
 2015, pp. 234–241.                                            Encryption and Steganography of a Number of Images in
                                                               the Digital Video,” in 2021 International Conference on
[5] Hameed Abdul-Kareem Younis, Marwa Kamel
 Hussien, “Multi-Frame Video Compression Scheme Using          Electrical, Computer, Communications and Mechatronics
 Three Step Search ( TSS ) Matching Algorithm”, The            Engineering (ICECCME), 2021, pp. 1–6.
                                                              [20] K. Hussein, E. Barges, and N. Jameel, “Security issues
 islamic college university journal, Issue 29, pp. 49-68,      in wireless sensor networks,” J. Multi-Disciplinary Eng.
                                                               Sci. Stud., vol. 3, no. 6, pp. 1798–1800, 2017.
 2014.                                                        [21] A. Danti and G. R. Manjula, “Secured data hiding of
[6] M. K. Hussien and H. A.-K. Younis, “Wavelet-Based
                                                               invariant sized secrete image based on discrete and hybrid
 Video Compression System Using Diamond Search (DS)            wavelet transform,” in 2012 IEEE International
 Matching Algorithm,” J. kerbala Univ., vol. 1, pp. 249–
                                                               Conference on Computational Intelligence and Computing
 258, 2013.                                                    Research, 2012, pp. 1–6.
[7] J. Fang, Q. Zhou, and S. Wang, “Segmentation              [22] A. Z. Atiyah and K. H. Ali, “Brain MRI Images
 Technology of Nucleus Image Based on U-Net Network,”          Segmentation Based on U-Net Architecture”, Iraqi Journal

 Sci. Program., vol. 2021, 2021.                               for Electrical and Electronic Engineering, pp. 21-27, 2021.

[8] N. Darapaneni, A. Jagannathan, V. Natarajan, G. V.         DOI: 10.37917/ijeee.18.1.3

 Swaminathan, S. Subramanian, and A. R. Paduri,
 “Semantic Segmentation of Solar PV Panels and Wind
 Turbines in Satellite Images Using U-Net,” in 2020 IEEE

 15th International Conference on Industrial and
 Information Systems (ICIIS), 2020, pp. 7–12.

[9] H. A. Younis and M. K. Hussein, "Adaptive Video

 Compression Technique Based on Wavelet Transform and

 NTSS Matching Algorithm NTSS", Journal of College of
 Education for Pure Sciences, vol. 4, no. 1, pp. 203–214.
[10] H. A. Ali and A. J. J. M. K. Hussein, “Secure Data
 Hiding Technique Using Video Steganography,” Des. Eng.,
 pp. 6208–6217, 2021.

[11] A. Garcia-Garcia, S. Orts-Escolano, S. Oprea, V.
 Villena-Martinez, and J. Garcia-Rodriguez, “A review on

 deep learning techniques applied to semantic
 segmentation,” arXiv Prepr. arXiv1704.06857, 2017.
[12] Y. Guo, Y. Liu, T. Georgiou, and M. S. Lew, “A review
 of semantic segmentation using deep neural networks,” Int.
 J. Multimed. Inf. Retr., vol. 7, no. 2, pp. 87–93, 2018.

[13] B. J. Bhatkalkar, D. R. Reddy, S. Prabhu, and S. V
 Bhandary, “Improving the performance of convolutional

 neural network for the segmentation of optic disc in fundus

 images using attention gates and conditional random
 fields,” IEEE Access, vol. 8, pp. 29299–29310, 2020.
[14] C. Huang, H. Han, Q. Yao, S. Zhu, and S. K. Zhou, “3D

 U2-Net: a 3D universal U-Net for multi-domain medical
 image segmentation,” in International Conference on

 Medical Image Computing and Computer-Assisted
 Intervention, 2019, pp. 291–299.

[15] F. Isensee, P. Kickingereder, W. Wick, M. Bendszus,
   62   63   64   65   66   67   68   69   70   71   72