Papers by Amira Bibo Sallow
Segmentation of Optic Disc (OD) is one of the significant steps in automatic Diabetic Retinopathy... more Segmentation of Optic Disc (OD) is one of the significant steps in automatic Diabetic Retinopathy (DR) detecting. Thus, DR detecting needs to eliminate the OD pixels. In this paper, a new technique is presented for OD segmentation that depends on the histogram template matching algorithm and OD size. The template matching algorithm is used for finding the center of the OD. In this step, the histogram of each RGB (Red, Green, and Blue) planes is found and then the cross-correlation is found between the template and the original image, OD location is the point with maximum cross-correlation between them. The OD size varies according to the camera field of sight and the resolution of the original image. The rectangle size of OD is not the same for various databases, the estimated size for the DRIVE, STARE, DIARTDB0, and DIARTDB1 are 80×80, 140×140, 190×190, and 190×190 respectively. After finding the OD center and rectangle size of OD, a binary mask is created with Region of Interest (ROI) for segmenting the OD. The DIARTDB0, DIARTDB1 and DRIVE are used to evaluate the proposed technique, the result was robust and vital with an accuracy of 96%, 98% and 98% respectively.
Doctoral Thesis / Dissertation from the year 2013 in the subject Computer Science - General, grad... more Doctoral Thesis / Dissertation from the year 2013 in the subject Computer Science - General, grade: 90, University of Mosul (College of Computer Sciences And Mathematics), language: English, abstract: Now a day completed real-time systems are distributed. One of the working area of real-time scheduling is distributed scheduling. Task scheduling in distributed systems is dealt with two levels: on the level of each processor (local scheduling), and on the level of the allocation of tasks to processors (global scheduling). In this thesis, a distributed real-time system with fault tolerance has been designed and called Fault Tolerance Distributed Real Time System FTDRTS. The system consists of heterogeneous processors act as servers and clients connected together via LAN communication network. This system has two types of scheduling schemes: (1) global model scheduling, (2) independent model scheduling for scheduling tasks in real time distributed manner. The time utility function TUF has been developed and called the DTUF (Developed TUF) function. This function gives another dimension and used to priorities' tasks, based on whether they are Urgent or Important, or both, or neither. A fault tolerance protocol called DRT-FTIP (Distributed Real Time - Fault Tolerance Integrity Protocol) has been developed. This protocol increases the integrity of the scheduling in distributed real time systems. The proposed Distributed Real-Time system with its scheduling algorithms and integrity protocol have been designed using the Java Remote Method Invocation (RMI) and use the Flight Reservation System as a case study. The simulation results of this proposed distributed realtime system using global scheduling algorithm gives Deadline Satisfaction Ratio (DSR) equal 95%. While Accrued Utility Ratio (AUR) equal 0.7286.
Asian Journal of Research in Computer Science, May 26, 2021
This work was carried out in collaboration among all authors. Author SHH wrote the detailed revie... more This work was carried out in collaboration among all authors. Author SHH wrote the detailed review of previous works related to IoT for smart environment monitoring, author ABS gave the idea and put the framework of the review. Both authors read and approved the final manuscript.
Academic journal of Nawroz University, Aug 31, 2019
Segmentation of optical disk (OD) and blood vessel is one of the significant steps in automatic d... more Segmentation of optical disk (OD) and blood vessel is one of the significant steps in automatic diabetic retinopathy (DR) detecting. In this paper, a new technique is presented for OD segmentation that depends on the histogram template matching algorithm and OD size. In addition, Kirsch method is used for Blood Vessel (BV) segmentation which is one of the popular methods in the edge detection and image processing technique. The template matching algorithm is used for finding the center of the OD. In this step, the histogram of each RGB (Red, Green, and Blue) planes are founded and then the cross-correlation is founded between the template and the original image, OD location is the point with maximum cross-correlation between them. The OD size varies according to the camera field of sight and the resolution of the original image. The rectangle size of OD is not the same for various databases, the estimated size for DRIVE, STARE, DIARTDB0, and DIARTDB1 are 80×80, 140×140, 190×190, and 190×190 respectively. After finding the OD center and rectangle size of OD, a binary mask is created with Region of Interest (ROI) for segmenting the OD. The DIARTDB0 is used to evaluate the proposed technique, the result is robust and vital with an accuracy of 96%.
Maǧallaẗ al-rāfidayn li-ʿulūm al-ḥāsibāt wa-al-riyāḍiyyāẗ, Jun 17, 2022
Machine learning and deep learning algorithms have become increasingly important in the medical f... more Machine learning and deep learning algorithms have become increasingly important in the medical field, especially for diagnosing disease using medical databases. Techniques developed within these two fields are now used to classify different diseases. Although the number of Machine Learning algorithms is vast and increasing, the number of frameworks and libraries that implement them is also vast and growing. TensorFlow is a well-known machine learning library that has been used by several researchers in the field of disease classification. With the help of TensorFlow (Google's framework), a complex calculation can be addressed effectively by modeling it as a graph and properly mapping the graph segments to the machine in the form of a cluster. In this review paper, the role of the TensorFlow-Python framework-for disease classification is discussed.
Academic journal of Nawroz University, Aug 31, 2019
Accepting Augmented Reality (AR) technologies to add to our observation and assist our understand... more Accepting Augmented Reality (AR) technologies to add to our observation and assist our understanding, hearing, and touch our surroundings in novel and augmented habits. AR determination maintenance in playing field such as edification, preservation, proposal and investigation, to designation but a few. Designates the sports ground of AR, together with a momentary characterization and improvement olden times, the allowing knowledge and their physical appearance. It surveys the formal of the art by rereading about recent submissions of AR technology with some recognized margins on the subject of anthropological features in the use of AR methods that inventers will need to astound. In this paper, an AR technique is presented, as a review from 2017 until 2018. Furthermore, we have stated the best technique of AR, and table of summarization for all reviewed articles.
Revue d'Intelligence Artificielle
Asian Journal of Research in Computer Science, 2021
Water is a basic human need in all economic operations. Farmland, renewable energy, the industria... more Water is a basic human need in all economic operations. Farmland, renewable energy, the industrial industry, and mining are all critical economic areas. Water supplies are under severe strain. With the population increase, the requirement for water from competing economic sectors is increased. So, there is not enough water left to meet human needs and maintain environmental flows that maintain the integrity of our ecosystems. Underground water is becoming depleted in many sectors, making now and future generations near the point of being deprived of protection from the increasing climate variability. Therefore, the critical role that information technology methods and internet communication technologies (ICT) play in water resources managing to limit the excessive waste of fresh water and to control and monitor water pollution. In this paper, we have to review research that uses the internet of things (IoT) as a communication technology that controls the preservation of the availabl...
2019 International Conference on Advanced Science and Engineering (ICOASE), 2019
High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing... more High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing parallel computing by building parallel Processing Elements (PEs) called virtual processors. One important reason is that FPGAs are special purpose devices. Hence, implementing any system based on these devices will give faster and more precise results than those given by using PCs, even if parallel processing approaches been applied by PCs. In this paper, two systems based on FPGA devices have been built for High Performance Computing (HPC). Code breaking for Simplified Data Encryption Standard (DES) algorithm was depended as case study. The first system consists of one FPGA device operated in a sequential way. One FPGA device contains one PE works in sequential fashion. This PE represents one simplified DES algorithm with two complete rounds. While the second system is a parallel one, also it consists of one FPGA device, but programmed to be implemented in parallel manner. The FPGA device contains 512 PEs operated in a parallel fashion. Each PE represents two completed rounds of simplified DES algorithm. In the second system, FPGA device works in much higher speed than the first one, because of that it works in parallel manner. Hence, reflecting great effect toward reducing the code breaking time and providing better results.
Academic Journal of Nawroz University, 2020
Networks of computers are everywhere. The Internet is one, as are the many networks of which it i... more Networks of computers are everywhere. The Internet is one, as are the many networks of which it is composed. Mobile phone networks, corporate networks, factory networks, campus networks, home networks, in-car networks, both separately and in combination, all share the essential characteristics that make them relevant subjects for study under the heading distributed systems. Most organizations use a wide variety of applications for the smooth functioning of their businesses that includes homogenous as well as heterogeneous systems. Heterogeneous systems run on different platforms, use different technologies or sometimes even run on a different network architecture altogether. The essential role of Middleware is to provide a simple environment to manage complex, heterogeneous and distributed infrastructures. The main goal of this paper is to use Java-RMI middleware to build a distributed system for scheduling the threads. The system comprises two separate programs, a server, and a cli...
AL-Rafidain Journal of Computer Sciences and Mathematics, 2013
In the distributed real time systems, tasks must meet their deadline even in the presence of hard... more In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the system to meet the tasks deadline and to detect their failure and recover them. In this paper, we considered the problem of fault tolerance and developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time-Fault Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in distributed real time systems.
Academic Journal of Nawroz University, 2019
Smartphones have greatly advanced in the past decade. The first smartphone had very low processin... more Smartphones have greatly advanced in the past decade. The first smartphone had very low processing power and memory. Nowadays, smartphones have close to desktop class processors and memory. They are also equipped with high resolution displays. This advancement enables creating and running sophisticated and large graphics applications. Such as Augmented and Virtual reality. Augmented Reality (AR) can be described as a view of the real-world environment extended with computer-generated three-dimensional objects. AR enables placing objects that are designed in a computer to the user environment with fine precision. AR can be largely useful in a variety of fields. On that note, AR is making great contribution to the field of education in the present time. Studying and learning different subjects can be a dull experience, especially for primary school children. Children nowadays are growing in the internet and technology era. Thus, education must evolve to the technological standard as w...
Academic Journal of Nawroz University, 2019
The paper presents a brief account of a case study reflecting steps that may be found useful as g... more The paper presents a brief account of a case study reflecting steps that may be found useful as guidelines for initiating an outcome-based education (OBE) environment for programs at a higher education institution (HEI). It highlights the broad steps in the process of establishing a framework for a curriculum of an undergraduate program in light of current trends, with suggestions that may be helpful in paving the way for a HEI to follow, should such an aim be desired. A sample of a computer science (CMSC) program is used as an example to illustrate the steps followed in accordance with relevant academic accreditation criteria and quality assurance (QA) standards.
Academic Journal of Nawroz University, 2017
Smartphones are used by billions of people that means the applications of the smartphone is incre... more Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them.
Academic journal of Nawroz University, 2017
In today's world, the swift increase of utilizing mobile services and simultaneously discovering ... more In today's world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
Eurasian Journal of Science and Engineering
E-Government services have become more widely available in developing countries in recent years. ... more E-Government services have become more widely available in developing countries in recent years. This is beneficial for all stakeholders, especially for people, because it enables the facilitation of government services and contacts with citizens, which can then be evaluated for efficiency and effectiveness. Additionally, as internet use and digitalization have expanded, governments worldwide have taken the essential steps toward E-Governance, integrating government procedures with information technology. Despite this encouraging trend, there is evidence of limited citizen uptake and use of E-Government services. Electronic government services are implemented as technological initiatives, with the underlying premise that citizens will use them. As a result, citizens' expectations for these services are not realized. This study evaluates current research on E-Government to identify gaps, limitations, and future research paths. A recent study in this area primarily focuses on the national level, with little concentration on the local level. As a result, future research proposals focus on E-Government at the municipal level.
2022 2nd International Conference on Intelligent Technologies (CONIT)
2020 International Conference on Advanced Science and Engineering (ICOASE), 2020
Nowadays, cybersecurity threat is a big challenge to all organizations that present their service... more Nowadays, cybersecurity threat is a big challenge to all organizations that present their services over the Internet. Distributed Denial of Service (DDoS) attack is the most effective and used attack and seriously affects the quality of service of each E-organization. Hence, mitigation this type of attack is considered a persistent need. In this paper, we used Network Load Balancing (NLB) and High Availability Proxy (HAProxy) as mitigation techniques. The NLB is used in the Windows platform and HAProxy in the Linux platform. Moreover, Internet Information Service (IIS) 10.0 is implemented on Windows server 2016 and Apache 2 on Linux Ubuntu 16.04 as web servers. We evaluated each load balancer efficiency in mitigating synchronize (SYN) DDoS attack on each platform separately. The evaluation process is accomplished in a real network and average response time and average CPU are utilized as metrics. The results illustrated that the NLB in the Windows platform achieved better performance in mitigation SYN DDOS compared to HAProxy in the Linux platform. Whereas, the average response time of the Window webservers is reduced with NLB. However, the impact of the SYN DDoS on the average CPU usage of the IIS 10.0 webservers was more than those of the Apache 2 webservers.
A fractal is a mathematical set that typically displays self-similar<br> patterns, which me... more A fractal is a mathematical set that typically displays self-similar<br> patterns, which means it is "the same from near as from far".<br> Fractals may be exactly the same at every scale, they may be<br> nearly the same at different scales. The concept of fractal extends<br> beyond trivial self-similarity and includes the idea of a detailed<br> pattern repeating itself. The algorithms to constructing different<br> fractal shapes in many cases typically involve large amounts of<br> floating point computation, to which modern GPUs are well<br> suited. In this paper we will construct Sierpinski Gasket using<br> GPUs arrays.
Uploads
Papers by Amira Bibo Sallow