Search Results - "Mstafa, Ramadhan J."
-
1
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC
Published in IEEE access (2017)“…Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development…”
Get full text
Journal Article -
2
Identifying Severity Grading of Knee Osteoarthritis from X-ray Images Using an Efficient Mixture of Deep Learning and Machine Learning Models
Published in Diagnostics (Basel) (24-11-2022)“…Recently, many diseases have negatively impacted people's lifestyles. Among these, knee osteoarthritis (OA) has been regarded as the primary cause of activity…”
Get full text
Journal Article -
3
A Comprehensive Survey on Bone Segmentation Techniques in Knee Osteoarthritis Research: From Conventional Methods to Deep Learning
Published in Diagnostics (Basel) (01-03-2022)“…Knee osteoarthritis (KOA) is a degenerative joint disease, which significantly affects middle-aged and elderly people. The majority of KOA is primarily based…”
Get full text
Journal Article -
4
A Review on Deep Sequential Models for Forecasting Time Series Data
Published in Applied computational intelligence and soft computing (03-06-2022)“…Deep sequential (DS) models are extensively employed for forecasting time series data since the dawn of the deep learning era, and they provide forecasts for…”
Get full text
Journal Article -
5
Improving AODV Routing Protocol for Image Transmission Over Mobile Video Sensor Networks
Published in IEEE access (2020)“…Wireless Sensor Networks (WSNs) have become extremely popular for sensing, collecting, and transmitting data across different environments. In particular, the…”
Get full text
Journal Article -
6
A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector
Published in IEEE access (01-01-2020)“…Recent developments in the speed of the Internet and information technology have made the rapid exchange of multimedia information possible. However, these…”
Get full text
Journal Article -
7
Impact of Video Motion Content on HEVC Coding Efficiency
Published in Computers (Basel) (01-08-2024)“…Digital video coding aims to reduce the bitrate and keep the integrity of visual presentation. High-Efficiency Video Coding (HEVC) can effectively compress…”
Get full text
Journal Article -
8
Lightweight deep CNN-based models for early detection of COVID-19 patients from chest X-ray images
Published in Expert systems with applications (01-08-2023)“…Hundreds of millions of people worldwide have recently been infected by the novel Coronavirus disease (COVID-19), causing significant damage to the health,…”
Get full text
Journal Article -
9
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
Published in Multimedia tools and applications (01-09-2016)“…Due to the significant growth of video data over the Internet, video steganography has become a popular choice. The effectiveness of any steganographic…”
Get full text
Journal Article -
10
Compressed and raw video steganography techniques: a comprehensive survey and analysis
Published in Multimedia tools and applications (01-10-2017)“…In the last two decades, the science of covertly concealing and communicating data has acquired tremendous significance due to the technological advancement in…”
Get full text
Journal Article -
11
A blind and robust color image watermarking scheme based on DCT and DWT domains
Published in Multimedia tools and applications (01-09-2023)“…With the emergence of the Internet of Things (IoT) and many smart gadgets that support artificial intelligence, it is easier than ever to acquire, reproduce,…”
Get full text
Journal Article -
12
Person-independent facial expression recognition based on the fusion of HOG descriptor and cuttlefish algorithm
Published in Multimedia tools and applications (01-03-2022)“…This paper proposes an efficient approach for person-independent facial expression recognition based on the fusion of Histogram of Oriented Gradients (HOG)…”
Get full text
Journal Article -
13
AR-Assisted Children Book For Smart Teaching And Learning Of Turkish Alphabets
Published in Virtual Reality & Intelligent Hardware (01-06-2022)“…Augmented reality (AR), virtual reality (VR), and remote-controlled devices are driving the need for a better 5G infrastructure to support faster data…”
Get full text
Journal Article -
14
A Study of Gender Classification Techniques Based on Iris Images: A Deep Survey and Analysis
Published in Science journal of University of Zakho (Online) (07-11-2022)“…Gender classification is attractive in a range of applications, including surveillance and monitoring, corporate profiling, and human-computer interaction…”
Get full text
Journal Article -
15
EM-SEP: An efficient modified stable election protocol
Published in Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education (01-04-2014)“…Recently wireless sensor networks (WSN) became an interesting topic because of its increasing usage in many fields; medical systems, environment monitoring,…”
Get full text
Conference Proceeding -
16
An Enhanced ElGamal Cryptosystem for Image Encryption and Decryption
Published in 2022 International Conference on Computer Science and Software Engineering (CSASE) (15-03-2022)“…ElGamal cryptosystem is one of the well-known public-key algorithms for its ability to generate different ciphertexts for the same plaintext on successive…”
Get full text
Conference Proceeding -
17
A DCT-based robust video steganographic method using BCH error correcting codes
Published in 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (01-04-2016)“…Due to the significant growth of video data over the Internet, it has become a popular choice for data hiding field. The performance of any steganographic…”
Get full text
Conference Proceeding -
18
A New Video Steganography Algorithm Based on the Multiple Object Tracking and Hamming Codes
Published in 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (01-12-2015)“…In the modern world, video steganography has become a popular option for secret data communication. The performance of any steganography algorithm is based on…”
Get full text
Conference Proceeding -
19
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)
Published in 2015 Wireless Telecommunications Symposium (WTS) (01-04-2015)“…Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm…”
Get full text
Conference Proceeding -
20
A highly secure quantum communication scheme for Blind Signature using qubits and qutrits
Published in Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education (01-04-2014)“…The advances in hardware speed has being rapidly increased rapidly in the recent years, which will lead to the ability to decrypt well known decryption…”
Get full text
Conference Proceeding