Abdulamir Abdullah Karim

Abdulamir Abdullah Karim
University of Technology - Iraq · Department of Computer Sciences

PhD

About

40
Publications
15,565
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
162
Citations
Introduction
Abdulamir Abdullah Karim currently works at the Department of Computer Sciences, University of Technology, Iraq. Abdulamir does research in Higher Education. Their current project is 'Objective quality assessment of 3D stereoscopic video based on motion vectors and depth map features'.

Publications

Publications (40)
Article
Full-text available
Elderly and stroke patients with speech and hearing difficulties often struggle with communication, particularly in complex environments. This paper presents a new dataset specifically created for semantic segmentation, instance segmentation, and sign recognition to meet the needs of these individuals. The dataset pertains to elderly Iraqis and was...
Article
Full-text available
The culture of Iraq, which boasts a rich history, serves as evidence of the magnificence of human civilization. Nonetheless, safeguarding and highlighting this valuable cultural legacy has become a significant worry in a time characterized by technological progress. Augmented Reality (AR) offers a powerful tool for preserving and presenting histori...
Article
Full-text available
This paper offers a solution to the problem of incompatibility of the TCP designed for networks with fixed routers and the Ad-hoc network, which sometimes its mobile hosts act as routers causing a routing failure. In order to overcome this obstacle, this work presents three Ad-hoc TCP novels. The first novel is adding a controller to Ad-hoc TCP que...
Article
Full-text available
Electrocardiogram (ECG) recognition systems now play a leading role in the early detection of cardiovascular diseases. However, the explanation of judgments made by deep learning models in these systems is prominent for clinical acceptance. This article reveals the effect of transfer learning in ECG recognition systems on decision precision. This a...
Article
Full-text available
Intelligent traffic systems are emerging and becoming part of smart city infrastructure that requires computer vision applications to provide traffic information like vehicle classification and counting in real-time. Vehicle counting helps detect heavy traffic on roads, and vehicle classification helps enforce further processes like speed estimatio...
Article
تقف الثقافة العراقية، بتاريخها الغني، شاهدا على عظمة الحضارة الإنسانية. ومع ذلك، أصبح الحفاظ على هذا التراث الثقافي الغني وتقديمه مصدر قلق ملح في عصر يتميز بالتقدم التكنولوجي. الواقع المعزز هو المتصدر في عالم التكنولوجيا، يوفر أداة قوية في هذا المجال. الهدف من هذا البحث هو الاستفادة من تقنية الواقع المعزز كوسيلة لضمان استمرار الحفاظ على التراث الثق...
Thesis
Full-text available
Computer vision applications are very important nowadays because they provide solutions to critical problems that relate to traffic systems in a cost-effective manner, in order to reduce accidents and preserve human lives. This dissertation presents a real-time computer vision system based on cutting-edge deep learning techniques to estimate the re...
Article
Full-text available
Computer vision applications are important nowadays because they provide solutions to critical problems that relate to traffic in a cost-effective manner in order to reduce accidents and preserve lives. This paper proposes a system for real-time traffic monitoring based on cutting-edge deep learning techniques through the state-of-the-art YOLOv8 al...
Article
Full-text available
Marking content with descriptive terms that depict the image content is called “tagging,” which is a well-known method to organize content for future navigation, filtering, or searching. Manually tagging video or image content is a time-consuming and expensive process. Accordingly, the tags supplied by humans are often noisy, incomplete, subjective...
Article
Full-text available
Microsoft Common Objects in Context (COCO) is a huge image dataset that has over 300 k images belonging to more than ninety-one classes. COCO has valuable information in the field of detection, segmentation, classification, and tagging; but the COCO dataset suffers from being unorganized, and classes in COCO interfere with each other. Dealing with...
Research
Full-text available
From big data analytics to computer vision and human-level control, deep learning has been effectively applied to a wide range of complicated challenges. However, these same deep learning advancements have also been used to develop malicious software that threatens individuals' personal data, democratic processes, and even national security. Apps b...
Article
Full-text available
This paper presents a tagging model used the Segmentation map as reference regions. The suggested model leverages an encoder-decoder architecture combined with a proposal layer and dense layers for accurate object tagging and segmentation. The proposed model utilizes a pre-trained VGG16 encoder to extract high-level features from input images, foll...
Research
Full-text available
The Digital watermarking is a field of information hiding that entails hiding the crucial information in the original data in order to prevent illegal duplication and distribution of multimedia data such as image, video, text and ect.. In this paper, we present two techniques to embed watermarks in the cover image. The first is the Least Significan...
Article
Full-text available
Significant advances have been made in facial image animation from a single image. Nonetheless, generating convincing facial feature movements remains a complex challenge in computer graphics. The purpose of this study is to develop an efficient and effective approach for transferring motion from a source video to a single facial image by governing...
Article
Full-text available
The purpose of text to speech (TTS), sometimes called speech synthesis, is to synthesize a natural and intelligible speech for a given text. A wide range of applications uses TTS technologies in media, chatbots, and entertainment, among other fields, making it a hot topic for the research community. Recently, the progress achieved by artificial int...
Article
Full-text available
Multimedia security is extremely significant concern for the internet technology because of the ease of the duplication, distribution and manipulation of the multimedia data. The digital watermarking is a field of information hiding which hide the crucial information in the original data for protection the illegal duplication and distribution of m...
Article
Full-text available
motion classification and prediction based on discrete wavelet transform
Article
Full-text available
Recent advances in computer vision have allowed wide-ranging applications in every area of life. One such area of application is the classification of fresh products, but the classification of fruits and vegetables has proven to be a complex problem and needs further development. In recent years, various machine learning techniques have been exploi...
Article
Full-text available
Abstract— Extraction of features plays a very significant part in the creation of images. Different image preprocessing methods such as banalization, thresholding, resizing, normalization are added to the captured picture prior to receiving functionality. After that, techniques of extraction of features are applied to obtain features which will be...
Article
Full-text available
Human motion generation and prediction is one of important subjects in computer vision, human robot interactions and animations. There are many methods have been used for human motion modelling. This paper illustrate a survey about human motion imagination and prediction and explain the types and methods of video generation and human motion modelli...
Conference Paper
Full-text available
Abstract—Convolution Neural Networks (CNNs) have received considerable attention due to their ability to learn directly from data classification features. CNNs used for human motion classification, where predefined and fixed convolutional filter size used. In this paper, different sizes and numbers of filters were used with CNN to determine their e...
Article
Full-text available
Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris c...
Article
Full-text available
Video represented by a large number of frames synchronized with audio making video saving requires more storage, it's delivery slower, and computation cost expensive. Video summarization provides entire video information in minimum amount of time. This paper proposes static and dynamic video summarization methods. The proposed static video summariz...
Article
Full-text available
Nowadays, the protection of secret data, which is being sent during transmission channel, has become one of the most important challenges in the information security. Therefore, the using of multimedia technology to provide data protection is needed. Hence, one of the most common data security methods used is image steganography. This paper applied...
Conference Paper
Full-text available
There has been a growing expansion in the use of steganography, due to the evolution in using internet technology and multimedia technology. Hence, nowadays, the information is not secured sufficiently while transmitting it over the network. Therefore, information security has taken an important role to provide security against unauthorized individ...
Article
Full-text available
In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for feature...
Article
Full-text available
Features are the description of the image contents which could be corner, blob or edge. Scale-Invariant Feature Transform (SIFT) extraction and description patent algorithm used widely in computer vision, it is fragmented to four main stages. This paper introduces image feature extraction using SIFT and chooses the most descriptive features among t...
Article
Full-text available
Background Subtraction (BGS) is one of the main techniques used for moving object detection which further utilized in video analysis, especially in video surveillance systems. Practically, acquiring a robust background (reference) image is a real challenge due to the dynamic change in the scene. Hence, a key point to BGS is background modeling, in...
Article
Full-text available
In this research a new data stream clustering method utilizing seed based region growing technique is implemented to perform abnormal event detection in anomaly detection system in a new data stream clustering method used in abnormal detection system. This is done by applying HARRIS or FAST detectors on the frames of video clips in two publically a...
Article
Full-text available
Images are important medium for conveying information; this makes improvement of image processing techniques also important. Interpretation of image content is one of the objectives of image processing techniques. Image interpretation that segments the image to number of objects called image segmentation. Image segmentation is an important field to...
Article
Full-text available
In computer vision, visual object tracking is a significant task for monitoring applications. Tracking of object type is a matching trouble. In object tracking, one main difficulty is to select features and build models which are convenient for distinguishing and tracing the target. The suggested system for continuous features descriptor and matchi...
Article
Full-text available
The work in this paper is dedicated to present and experiment a fully automatic face recognition approach based on exploiting the distinctive traits of 3D facial scans. We aim to present a recognition approach operates with fully and partial facial scans (missing facial parts). A region based approach for registration and recognition processes is a...
Article
Full-text available
The extraction of features involves the method of converting the original pixel values of an image to more meaningful, useful and measurable information
Conference Paper
Full-text available
The 3D faces matching a challenging problem lying at the core of essential research areas in 3d face recognition systems and requires a crucial registration technique in order to achieve high matching rates. In this work, we address within a new framework, the keypoints detection problem and face registration in 3D partial facial scans (implies mis...

Network

Cited By