Skip to main content
A Coronavirus disease 2019 (COVID-19) pandemic detection considers a critical and challenging task for the medical practitioner. The coronavirus disease spread so rapidly between people and infected more than one hundred and seventy... more
    • by  and +1
    •   2  
      Medical ImagingAutomated Toll Collection System Using NFC And Theft Vehicle Detection
A construction of a 3D geological model of Yamama Formation to explain the distribution of petrophysical properties (shale volume, effective porosity and hydrocarbon saturation) by using Petrel software. Five wells were selected in order... more
    • by 
    •   3  
      GeologyOil FieldPetroleum Engineering
In this paper, we present BASRAH, a system that automatically identifies the meter of Arabic verse, which is an operation that requires a certain level of human expertise. BASRAH uses the numerical prosody method, which depends on verse... more
    • by 
    •   3  
      Computer ScienceNatural Language ProcessingAsian Language Processing
In this paper, we propose a post decoding system combination approach for automatic transcribing Malay broadcast news. This approach combines the hypotheses produced by parallel automatic speech recognition (ASR) systems. Each ASR system... more
    • by 
    •   4  
      EngineeringComputer ScienceLanguage ModelWord error rate
The main motivation of this paper is to improve the automatic speech recognition (ASR) hypothesis in the Malay language. Manual news transcription is too expensive and takes a long time. Hence, without an ASR system, access to audio... more
    • by 
    •   3  
      Computer ScienceLanguage ModelWord error rate
Coronavirus (COVID-19) pandemic detection considers a critical and challenging task for the doctors. The coronavirus disease spread so rapidly between people and infected roughly fourteen million people worldwide. For this reason, it is... more
    • by 
    •   2  
      Artificial IntelligenceMedicine
This paper represents a new approach for face recognition that incorporates Prewitt edge detection, Gabor filter and Zernike moments to transform the image into a unified domain. On this joint domain, five distance metrics are constructed... more
    • by 
    •   7  
      MathematicsArtificial IntelligenceComputer EngineeringZernike moments
A Coronavirus disease 2019 (COVID-19) pandemic detection considers a critical and challenging task for the medical practitioner. The coronavirus disease spread so rapidly between people and infected more than one hundred and seventy... more
    • by 
    •   4  
      Artificial IntelligenceMedical ImagingComputed TomographyAutomated Toll Collection System Using NFC And Theft Vehicle Detection
Herein we describe the latent semantic algorithm method for identifying broadcast news story boundaries. The proposed system uses the pronounced forms of words to identify story boundaries based on popular noun unification. Commonly used... more
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceNatural Language ProcessingLatent Semantic Analysis
An information retrieval (IR) is a system that locates information in collections of unstructured or semistructured document which are relevant to the user query. Usually, the query represented by short query that have a few features or... more
    • by 
Aircraft detection is an essential and noteworthy area of object detection that has received significant interest from scholars, especially with the progress of deep learning techniques. Aircraft detection is now extensively employed in... more
    • by 
    • Computer Science
Parallel manipulators have a rigid structure and can pick up the heavy objects. Therefore, a parallel manipulator has been developed based on the cooperative of three arms of a robotic system to make the whole system suitable for solving... more
    • by 
The Holy Quran, due to it is full of many inspiring stories and multiple lessons that need to understand it requires additional attention when it comes to searching issues and information retrieval. Many works were carried out in the Holy... more
    • by 
    •   6  
      Computer ScienceOntologyProcess OntologyUpper Ontology
In today’s world, social media has spread widely, and the social life of people have become deeply associated with social media use. They use it to communicate with each other, share events and news, and even run businesses. The huge... more
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceMachine LearningFEATURE SELECTION TECHNIQUES
Data security pressing issue, particularly in terms of ensuring secure and reliable data transfer over a network. Encryption and seganography play a fundamental role in the task of securing data exchanging. In this article, both... more
    • by 
    •   4  
      Computer ScienceCryptographyAudio SteganographyLSB steganography
Text data present in images contain useful information for automatic explanation, indexing, and structuring of images. Extraction of this information involves detection, localization, tracking, extraction, enhancement, and recognition of... more
    • by 
    •   4  
      Computer ScienceImage ProcessingText DetectionText Localization
An important objective in the design and implementation of efficient routing algorithms for Wireless Sensor Networks (WSN) is to minimize the energy consumption, in order to maximize the lifespan of the network.
    • by 
Temperature control systems have the characteristics of non-linearity, large inertia, and time variance. It is difficult to overcome the effects of these factors and get a reasonable results with the use of conventional controllers such... more
    • by  and +2
    •   2  
      TechnologyControl Structure
Automated visual inspection system has been developed to specify brick quality and the accepting of the bricks in a production line. This system is based on CMOS web-camera placed in manufacture line. Depending on diameters, area,... more
    • by 
    • Sensor Technology
Many important features of chaotic systems can be exploited in cryptography such as: ergodicity, sensitivity to initial condition, mixing property. These features lead to a significant relationship between cryptography and chaos. Sensor... more
    • by 
    • Wireless Sensor Network Security