The segmentation methods for image processing are studied in the presented work. Image segmentation can be defined as a vital step in digital image processing. Also, it is used in various applications including object co-segmentation, recognition tasks, medical imaging, content based image retrieval, object detection, machine vision and video surveillance. A lot of approaches were created for image segmentation. In addition, the main goal of segmentation is to facilitate and alter the image representation into something which is more important and simply to be analyzed. The approaches of image segmentation are splitting the images into a few parts on the basis of image’s features including texture, color, pixel intensity value and so on. With regard to the presented study, many approaches of image segmentation are reviewed and discussed. The techniques of segmentation might be categorized into six classes: First, thresholding segmentation techniques such as global thresholding (iterative thresholding, minimum error thresholding, otsu's, optimal thresholding, histogram concave analysis and entropy based thresholding), local thresholding (Sauvola’s approach, T.R Singh’s approach, Niblack’s approaches, Bernsen’s approach Bruckstein’s and Yanowitz method and Local Adaptive Automatic Binarization) and dynamic thresholding. Second, edge-based segmentation techniques such as gray-histogram technique, gradient based approach (laplacian of gaussian, differential coefficient approach, canny approach, prewitt approach, Roberts approach and sobel approach). Thirdly, region based segmentation approaches including Region growing techniques (seeded region growing (SRG), statistical region growing, unseeded region growing (UsRG)), also merging and region splitting approaches. Fourthly, clustering approaches, including soft clustering (fuzzy C-means clustering (FCM)) and hard clustering (K-means clustering). Fifth, deep neural network techniques such as convolution neural network, recurrent neural networks (RNNs), encoder-decoder and Auto encoder models and support vector machine. Finally, hybrid techniques such as evolutionary approaches, fuzzy logic and swarm intelligent (PSO and ABC techniques) and discusses the pros and cons of each method.
Brain tumors are collections of abnormal tissues within the brain. The regular function of the brain may be affected as it grows within the region of the skull. Brain tumors are critical for improving treatment options and patient survival rates to prevent and treat them. The diagnosis of cancer utilizing manual approaches for numerous magnetic resonance imaging (MRI) images is the most complex and time-consuming task. Brain tumor segmentation must be carried out automatically. A proposed strategy for brain tumor segmentation is developed in this paper. For this purpose, images are segmented based on region-based and edge-based. Brain tumor segmentation 2020 (BraTS2020) dataset is utilized in this study. A comparative analysis of the segmentation of images using the edge-based and region-based approach with U-Net with ResNet50 encoder, architecture is performed. The edge-based segmentation model performed better in all performance metrics compared to the region-based segmentation model and the edge-based model achieved the dice loss score of 0. 008768, IoU score of 0. 7542, f1 score of 0. 9870, the accuracy of 0. 9935, the precision of 0. 9852, recall of 0. 9888, and specificity of 0. 9951.
In developing nations, such as Iraq, supplying power to isolated and rural border areas that are not connected to the grid continues to be a problem. At present, fossil fuels, which are significant causes of pollution, supply around 80% of the world’s energy demands. Nonetheless, drastically reducing reliance on fossil fuels has many reasons, including depleting global fossil fuel supplies, increasing costs and growing energy needs. The present study examines the electrical requirements of the Al-Teeb area, a city situated in the eastern region of Iraq, close to the Iranian border. This region has not been researched despite its tourism and oil significance. Despite the unpredictable expansion of many isolated locations in Iraq in recent years, the number of generation stations has not changed. Supplying energy to these places will require considerable time and money. Photovoltaics (PV), wind turbines (WTs), diesel generators (DGs), batteries and converters combined on the basis of their compatibility under three distinct scenarios comprise the system’s components. Considering the lowest net present cost (NPC) and cost of energy (COE) of all the examined scenarios, PV, WTs, batteries and DGs are the most economical solutions for the Al-Teeb area. Number of PV (1,215), number of WTs (59), number of DGs (13), number of batteries (3,138), number of converters (47), COE (0.155 US$/kWh), NPC (14.2 million US$) and initial capital cost (4.91 million US$) are revealed by the results. Finally, the results are confirmed using another global optimization method, namely, modified particle swarm optimization.
Nowadays, it is difficult to imagine a powerful algorithm of cryptography that can continue cryptanalyzing and attacking without the use of unconventional techniques. Although some of the substitution algorithms are old, such as Vigen`ere, Alberti, and Trithemius ciphers, they are considered powerful and cannot be broken. In this paper we produce the novelty algorithm, by using of biological computation as an unconventional search tool combined with an uninhibited analysis method is the vertical probabilistic model, that makes attacking and analyzing these ciphers possible and very easy to transform the problem from a complex to a linear one, which is a novelty achievement. The letters of the encoded message are processed in the form of segments of equal length, to report the available hardware components. Each letter codon represents a region of the memory strand, and the letters calculated for it are symbolized within the probabilistic model so that each pair has a triple encoding: the first is given as a memory strand encoding and the others are its complement in the sticker encoding; These encodings differ from one region to another. The solution space is calculated and then the parallel search process begins. Some memory complexities are excluded even though they are within the solution paths formed, because the natural language does not contain its sequences. The precision of the solution and the time consuming of access to it depend on the length of the processed text, and the precision of the solution is often inversely proportional to the speed of access to it. As an average of the time spent to reach the solution, a text with a length of 200 cipher characters needs approximately 15 minutes to give 98% of the correct components of the specific hardware. The aim of the paper is to transform OTP substitution analysis from a NP problem to a O(nm) problem, which makes it easier to find solutions to it easily with the available capabilities and to develop methods that are harnessed to attack difficult and powerful ciphers that differ in class and type from the OTP polyalphabetic substitution ciphers.
Wavelet-based algorithms are increasingly used in the source coding of remote sensing, satellite and other geospatial imagery. At the same time, wavelet-based coding applications are also increased in robust communication and network transmission of images. Although wireless multimedia sensors are widely used to deliver multimedia content due to the availability of inexpensive CMOS cameras, their computational and memory resources are still typically very limited. It is known that allowing a low-cost camera sensor node with limited RAM size to perform a multi-level wavelet transform, will in return limit the size of the acquired image. Recently, fractional wavelet filter technique became an interesting solution to reduce communication energy and wireless bandwidth, for resource-constrained devices (e.g. digital cameras). The reduction in the required memory in these fractional wavelet transforms is achieved at the expense of the image quality. In this paper, an adaptive fractional artifacts reduction approach is proposed for efficient filtering operations according to the desired compromise between the effectiveness of artifact reduction and algorithm simplicity using some local image features to reduce boundaries artifacts caused by fractional wavelet. Applying such technique on different types of images with different sizes using CDF 9/7 wavelet filters results in a good performance.
The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to find the most secure ways to maintain integrity and protect privacy and security in healthcare management systems. The Advanced Encryption Standard (AES) algorithm is used to encrypt data transferred by providing a means to check the integrity of information transmitted and make it more immune to cyberattack techniques, this was implemented by using Keyed-Hash Message Authentication Code (HMAC) and Secured Hash Algorithm-256 (SHA-256). The risk of exposure to attackers can be avoided by using honeypot systems combined with Intrusion detection systems (IDSs) as a firewall system is not effective against such attacks alone. The experimental results evaluate the proposed security health information management system by comparing the performance of the encryption algorithm based on encryption time, memory and CPU usage, and entropy for different plaintext lengths. In addition, it can be seen that when changing the AES key size, more memory and time are required the longer the key size is used. The 128 bits AES key is therefore advised if the system must operate in hard real-time.
The dynamic performance of vertical-cavity surface emitting lasers (VCSEL) diodes can be enhanced by incorporating multiquantum-well (MQW) structure in the active region. This paper addresses the transient response of MQW-VCSEL by solving the laser rate equation in the large-signal regime. The analysis makes use of the energy band structure and optical gain spectrum obtained by applying Schrödinger equation to both conduction and valance bands. Simulation results are presented for $1.3~\mu m$ InGaAs/InP VCSEL and indicate clearly that a MQW laser has higher switching speed compared with bulk laser and this finding is more pronounced with small number of wells.
For many uses, biometric systems have gained considerable attention. Iris identification was One of the most powerful sophisticated biometrical techniques for effective and confident authentication. The current iris identification system offers accurate and reliable results based on near-infrared light (NIR) images when images are taken in a restricted area with fixed- distance user cooperation. However, for the color eye images obtained under visible wavelength (VW) without collaboration among the users, the efficiency of iris recognition degrades because of noise such as eye blurring images, eye lashing, occlusion, and reflection. This work aims to use the Gray-Level Co-occurrence Matrix (GLCM) to retrieve the iris's characteristics in both NIR iris images and visible spectrum. GLCM is second-order Statistical-Based Methods for Texture Analysis. The GLCM- based extraction technology was applied after the preprocessing method to extract the pure iris region's characteristics. The Energy, Entropy, Correlation, Homogeneity, and Contrast collection of second-order statistical features are determined from the generated co-occurrence matrix, Stored as a vector for numerical features. This approach is used and evaluated on the CASIA v1and ITTD v1 databases as NIR iris image and UBIRIS v1 as a color image. The results showed a high accuracy rate (99.2 %) on CASIA v1, (99.4) on ITTD v1, and (87%) on UBIRIS v1 evaluated by comparing to the other methods.
There are many serious accidents on human life caused by electric current columns, and it is possible for the Internet of Things to find solutions to prevent the risks that occur, as in many fields such as medicine, agriculture, industry and others. In this paper, we will show monitoring and tracking of the current that passes through the electrical poles and the possible leakage, in addition to monitoring the temperature and humidity in the area, and knowing the condition of the light in the column according to morning and evening, this proposed system that will perform a general purpose added to the region. using Open source NODE MCU board, GPS positioning, current sensor, temperature and humidity sensor that provide desired data via open source platforms that we have chosen to be ThingSpeak that easily to handle.
In different modern and future wireless communication networks, a large number of low-power user equipment (UE) devices like Internet of Things, sensor terminals, and smart modules have to be supported over constrained power and bandwidth resources. Therefore, wireless-powered communication (WPC) is considered a promising technology for varied applications in which the energy harvesting (EH) from radio frequency radiations is exploited for data transmission. This requires efficient resource allocation schemes to optimize the performance of WPC and prolong the network lifetime. In this paper, harvest-then-transmit-based WP non-orthogonal multiple access (WP-NOMA) system is designed with time-split (TS) and power control (PC) allocation strategies. To evaluate the network performance, the sum rate and UEs’ rates expressions are derived considering power-domain NOMA with successive interference cancellation detection. For comparison purposes, the rate performance of the conventional WP orthogonal multiple access (WP-OMA) is derived also considering orthogonal frequency-division multiple access and time-division multiple access schemes. Intensive investigations are conducted to obtain the best TS and PC resource parameters that enable maximum EH for higher data transmission rates compared with the reference WP-OMA techniques. The achieved outcomes demonstrate the effectiveness of designed resource allocation approaches in terms of the realized sum rate, UE’s rate, rate region, and fairness without distressing the restricted power of far UEs.
Facial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) for classification purpose. The results obtained from the different groups are then fused using Naïve Bayes classifier to make the final decision regards the emotion class. Different tests were performed using Surrey Audio-Visual Expressed Emotion (SAVEE) database and the achieved results showed that the system gives the desired accuracy (100%) when fusion decisions of the facial groups. The achieved result outperforms state-of-the-art results on the same database.
In this paper, a model of PI-speed control current-driven induction motor based on indirect field oriented control (IFOC) is addressed. To assess the complex dynamics of a system, different dynamical properties, such as stability of equilibrium points, bifurcation diagrams, Lyapunov exponents spectrum, and phase portraits are characterized. It is found that the induction motor model exhibits chaotic behaviors when its parameters fall into a certain region. Small variations of PI parameters and load torque affect the dynamics and stability of this electric machine. A chaotic attractor has been observed and the speed of the motor oscillates chaotically. Numerical simulation results are validating the theoretical analysis.
Image segmentation is a wide research topic; a huge amount of research has been performed in this context. Image segmentation is a crucial procedure for most object detection, image recognition, feature extraction, and classification tasks depend on the quality of the segmentation process. Image segmentation is the dividing of a specific image into a numeral of homogeneous segments; therefore, the representation of an image into simple and easy forms increases the effectiveness of pattern recognition. The effectiveness of approaches varies according to the conditions of objects arrangement, lighting, shadow and other factors. However, there is no generic approach for successfully segmenting all images, where some approaches have been proven to be more effective than others. The major goal of this study is to provide summarize of the disadvantages and the advantages of each of the reviewed approaches of image segmentation.
The residential electrical load in the city of Mosul as well as in most of cities in Iraq, is the major problem for the administration of electricity distribution. Since this kind of load is increasing drastically compared with other loads such as industrial, agricultural tourism and others which are declining for the last two decades due to unstable condition of the county. The residential electrical load components must be determined to solve the problems resulting from the significant increase in this load. This research aims to conduct a field survey to find out and identify the components of the residential electrical load ratios and qualitative change in the months of the year. The survey was conducted in the city of Mosul in northern Iraq. T he results were analyzed, and a number of recommendations were given to rationalize consumption.