Mohammed Sahib Mahdi Altaei
YOU?
Author Swipe
View article: Improved Optical System Design of Human Eye Using Ant Colony Optimization
Improved Optical System Design of Human Eye Using Ant Colony Optimization Open
The motive we address in this paper is to design an accurate optical system for the human eye using a newly used approach based on optimizing a human eye model by the Ant Colony Algorithm (ACO). The optimization process dealt with the opti…
View article: A Hybrid Model of Deep Learning and Machine Learning Methods to Detect Deepfake Videos
A Hybrid Model of Deep Learning and Machine Learning Methods to Detect Deepfake Videos Open
The deepfake videos were spread in the last few years and were created by different deepfake techniques (i.e., faceswap, face2face, etc.). These techniques have a terrible impact on society and would give anyone a chance to create videos w…
View article: Deep Learning Techniques for Detecting and Segmenting Text in Natural Scene Images: Review
Deep Learning Techniques for Detecting and Segmenting Text in Natural Scene Images: Review Open
Text detection and segmentation in natural scene images is an active research problem in computer vision and document analysis. Unlike scanned documents, scene text exhibits significant diversity in appearance, orientation, scale, font, an…
View article: Medical Images Based Covid-19 Detection Survey
Medical Images Based Covid-19 Detection Survey Open
In December 2019, COVID-19 appeared for the first time in Wuhan (Hubei Province, China), after which it quickly spread over the entire earth. The World Health Organization quickly designated COVID-19 a pandemic because of the high number o…
View article: Efficiency Evaluation of Popular Deepfake Methods Using Convolution Neural Network
Efficiency Evaluation of Popular Deepfake Methods Using Convolution Neural Network Open
Many deepfake techniques in the early years are spread to create successful deepfake videos (i.e., Face Swap, Deep Fake, etc.). These methods enable anyone to manipulate faces in videos, which can negatively impact society. One way to redu…
View article: Image hiding in audio file using chaotic method
Image hiding in audio file using chaotic method Open
In this paper, we propose an efficient image hiding method that combines image encryption and chaotic mapping to introduce adaptive data hiding for improving the security and robustness of image data hiding in cover audio. The feasibility …
View article: Detection of Deep Fake in Face Images Based Machine Learning
Detection of Deep Fake in Face Images Based Machine Learning Open
Fake face images is a recent critical issue of artificial intelligent due to it has directly impacts on the social lives, and may be made to imply threats against privacy, fraud, and other issues. Currently, creating fake images has become…
View article: Wireless Sensor Network Optimization Using Genetic Algorithm
Wireless Sensor Network Optimization Using Genetic Algorithm Open
Wireless Sensor Network (WSN) is a high potential technology used in many fields (agriculture, earth, environmental monitoring, resources union, health, security, military, and transport, IoT technology). The band width of each cluster hea…
View article: A Detection of Deep Fake in Face Images Using Deep Learning
A Detection of Deep Fake in Face Images Using Deep Learning Open
Fake images are one of the most widespread phenomena that have a significant influence on our social life, particularly in the world of politics and celeb. Nowadays, generating fake images has become very easy due to the powerful yet simpl…
View article: K-Means clustering of optimized wireless network sensor using genetic algorithm
K-Means clustering of optimized wireless network sensor using genetic algorithm Open
Wireless sensor network is one of the main technology trends that used in several different applications for collecting, processing, and distributing a vast range of data. It becomes an essential core technology for many applications relat…
View article: K-Means clustering of optimized wireless network sensor using genetic algorithm
K-Means clustering of optimized wireless network sensor using genetic algorithm Open
Wireless sensor network is one of the main technology trends that used in several different applications for collecting, processing, and distributing a vast range of data. It becomes an essential core technology for many applications relat…
View article: Plants Leaf Diseases Detection Using Deep Learning
Plants Leaf Diseases Detection Using Deep Learning Open
Agriculture improvement is a national economic issue that extremely depends on productivity. The explanation of disease detection in plants plays a significant role in the agriculture field. Accurate prediction of the plant disease can hel…
View article: Copy Move Forgery Detection Using Forensic Images
Copy Move Forgery Detection Using Forensic Images Open
Digital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instanc…
View article: Classification of Plants Leaf Diseases using Convolutional Neural Network
Classification of Plants Leaf Diseases using Convolutional Neural Network Open
Agriculture is one of the most important professions in many countries, including Iraq, as the Iraqi financial system depends on agricultural production and great attention should be paid to concerns about agricultural production. Because …
View article: Forged Copy-Move Recognition Using Convolutional Neural Network
Forged Copy-Move Recognition Using Convolutional Neural Network Open
Due to the extreme robust image editing techniques, digital images are subject to multiple manipulations and decreased costs for digital camera and smart phones. Therefore, image credibility is becoming questionable, specifically when imag…
View article: Brain Tumor Diagnosis Using MR Image Processing
Brain Tumor Diagnosis Using MR Image Processing Open
Magnetic Resonance Imaging (MRI) images of brain are a process of high importance to diagnosing brain tumors.Brain tumor is an abnormal growth of cells in the brain.These tumors may be benign or malignant.The use of computer technologies b…
View article: Human Action Recognition Based on Bag-of-Words
Human Action Recognition Based on Bag-of-Words Open
Human action recognition has gained popularity because of its wide applicability, such as in patient monitoring systems, surveillance systems, and a wide diversity of systems that contain interactions between people and electrical devices,…
View article: Color Image Restoration Using Iterative Mead’s Filter
Color Image Restoration Using Iterative Mead’s Filter Open
Image restoration is reconstructing the true image starting from degraded (blurred and noisy) image version.This problem could be handled as blind or non-blind mode depending on whether functional knowledge or point spread function (PSF) k…
View article: Simulation of Moving Obstacle Avoidance for Auto Guided Land Vehicle
Simulation of Moving Obstacle Avoidance for Auto Guided Land Vehicle Open
This paper concerned with simulating the behavior of designed control system that tries to govern robot to safely passing a path containing moving obstacle ahead.The used robot carried some specific sensors are used to sense the existence …
View article: EFFECT OF TEXTURE FEATURE COMBINATION ON SATELLITE IMAGE CLASSIFICATION
EFFECT OF TEXTURE FEATURE COMBINATION ON SATELLITE IMAGE CLASSIFICATION Open
This paper presents a method for SIC to classify a PatternNet satellite image dataset taken from Google Earth and Google Map Application newly adopted in 2017, this SIC method use firstly a pre-processing step to verify the way of how repr…
View article: Satellite Image Classification Using Moment and SVD Method
Satellite Image Classification Using Moment and SVD Method Open
The motivation we address in this paper is to classify satellite image using the moment and singular value decomposition (SVD) method; both proposed methods are consisted of two phases; the enrollment and classification. The enrollment pha…