License Plate (LP) is the unique identification of a car. License Plate Recognition (LPR) is a method used by a computer to convert digital images of vehicle license plates into text. LPR have a wide range of applications. Among these applications: traffic control, parking, access control, border control, and stolen cars tracking. This work aims to design a LPR for the Iraqi license plates. It consists of three basic stages (preprocessing, LP localization and LP recognition). Since the images of the vehicles are taken in different day time, then the first stage in the proposed LPR is...
License Plate (LP) is the unique identification of a car. License Plate Recognition (LPR) is a method used by a computer to convert digital images of ...
This book is aimed to develop a digital image processing system to process the input microscope images taken for blood samples, extract the discriminating features of the white blood cells, and then utilize these features to distinguish and recognize the normal white blood cells from two kinds of abnormal blood cancer cells. Many sets of textural and geometrical features have been suggested and tested in this book project, their discriminating power and capabilities have been tested and checked.
This book is aimed to develop a digital image processing system to process the input microscope images taken for blood samples, extract the discrimina...
This book introduces a solution to one of the society problems (monitoring of roads area coverage by vehicles for avoidance of traffic congestion) by using a camera. The main idea is to simulate the traffic policeman's actions in controlling the traffic light duration (timer) and the traffic pass permission (green light) through analyzing images sequences to determine the road occupation by vehicles (road density). The traffic duration is controlled according to the road density percentage; which is determined using an effective proposed metric for denasity calculation. The traffic pass...
This book introduces a solution to one of the society problems (monitoring of roads area coverage by vehicles for avoidance of traffic congestion) by ...
Today patient monitoring system along with wireless medical devices is used to monitor patients, but still the patients have to stay inside coverage area of wireless devices. Also, the systems depend on General Packet Radio Service (GPRS) service still face the problem of wireless accessibility versus time and location. This book introduces a trusty patient monitoring system that uses emerging technologies, such as Android OS, to establish a healthcare infrastructure. The system uses GPS technology to track the patients and performs automated steps to reach nearest medical care team to the...
Today patient monitoring system along with wireless medical devices is used to monitor patients, but still the patients have to stay inside coverage a...
During the last years, hand vein patterns recognition is one of the most recent biometric technologies used for the identification/verification of individuals. The vein trace is hard to damaged, changed or falsified since veins are internal to the human body. In this work, a novel palm vein recognition and verification system is presented. The system work flow passes through two main phases: (i) the enrollment phase and (ii) the recognition phase. In the enrollment phase, the biometric system is trained to identity a specific person. While, in the recognition phase, the system tries to...
During the last years, hand vein patterns recognition is one of the most recent biometric technologies used for the identification/verification of ind...
A computer program based on Monte Carlo method had been designed and written in visual basic computer language and utilized for simulating the classic problem of gamma ray beam incident on finite plane slabs of absorbing materials. The source geometry adopted in this program is plane normal source.Dose buildup factor of gamma photons including annihilation radiation have been calculated in the energy range (4-10) MeV for aluminum, iron, and lead up to 5 mean free path thickness.
A computer program based on Monte Carlo method had been designed and written in visual basic computer language and utilized for simulating the classic...
Diabetic retinopathy is a severe eye disease that affects many diabetic patients. It changes the small blood vessels in the retina resulting in loss of vision. Early detection and diagnosis have been identified as one of the ways to achieve a reduction in the percentage of visual impairment and blindness caused by diabetic retinopathy with emphasis on regular screening for detection and monitoring of this disease.The work in this book mainly focuses on developing a fundus image analysis system that extracts the fundal features of the retina such as optic disk, macula (i.e., fovea) and...
Diabetic retinopathy is a severe eye disease that affects many diabetic patients. It changes the small blood vessels in the retina resulting in loss o...
During the last decade, Iris recognition is considered as an active biometric challenging area. The main goal is to develop a system capable of interactively making identification and verification decision with minimum consuming time. Irregularities in iris images (like poor quality, nonlinearly deformed iris images) make the cognition task more hard and challenging. Also, the inherent noise are as in iris images cause significant degradation in cognition efficiency. The typical sources of noise include blur, eyelashes or eyelids obstruction and specular reflection. Another problem that any...
During the last decade, Iris recognition is considered as an active biometric challenging area. The main goal is to develop a system capable of intera...
The increased use of computer and internet had been associated with the wide use of multimedia data. The need for protecting these data has risen dramatically. To prevent the confidential information from being tampered with, one needs to apply some cryptographic techniques. Most of cryptographic methods have one similar weak point which is the data is centralized. To overcome this problem secret sharing was introduced. In this book compressive audio secret sharing based on transform coding and hyper-planes representation have been introduced. The introduced compressive secret sharing scheme...
The increased use of computer and internet had been associated with the wide use of multimedia data. The need for protecting these data has risen dram...
The distribution of digital media is becoming faster, easier, and requiring less effort to make exact copies. One of the major impediments is the lack of effective intellectual property protection of digital media to discourage unauthorized copying and distribution. In this book, a robust invisible watermarking system for digital video is presented. The proposed scheme provides watermark hiding by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The watermark embedding process implies several stages to nominate the video regions where watermark...
The distribution of digital media is becoming faster, easier, and requiring less effort to make exact copies. One of the major impediments is the lack...