Jwan Najeeb Saeed

Jwan Najeeb Saeed
Duhok Polytechnic University | DPU · IT

PhD Candidate

About

36
Publications
15,360
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
364
Citations
Citations since 2016
35 Research Items
361 Citations
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
Introduction
Jwan Najeeb Saeed currently works at IT, Duhok Polytechnic University.

Publications

Publications (36)
Article
Cardiovascular disorders are one of the major causes of sad death among older and middle-aged people. Over the past two decades, health monitoring services have evolved quickly and had the ability to change the way health care is currently provided. However, the most challenging aspect of the mobile and wearable sensor-based human activity recog...
Article
Full-text available
The bird classifier is a system that is equipped with an area machine learning technology and uses a machine learning method to store and classify bird calls. Bird species can be known by recording only the sound of the bird, which will make it easier for the system to manage. The system also provides species classification resources to allow autom...
Article
Full-text available
Facial attractiveness or facial beauty prediction (FBP) is a current study that has several potential usages. It is a key difficulty area in the computer vision domain because of the few public databases related to FBP and its experimental trials on the minor-scale database. Moreover, the evaluation of facial beauty is personalized in nature, wi...
Article
Full-text available
Skin cancer is among the primary cancer types that manifest due to various dermatological disorders, which may be further classified into several types based on morphological features, color, structure, and texture. The mortality rate of patients who have skin cancer is contingent on preliminary and rapid detection and diagnosis of malignant skin c...
Article
Full-text available
p> Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new a...
Cover Page
Machine Learning (Supervised,Unsupervised,Reinforcement),Algorithms.
Cover Page
Artificial Intelligence
Method
Reasons journals reject submissions: • not relevant to the context (local concerns not explained to a wider context). • not relevant to the readership/key concerns of the journal. • not new/original enough. • weaknesses within the paper (methodology, argument, findings). • a good paper, but not as good as others that were received. • methodological...
Research Proposal
A Guide to Quantitative and Qualitative Dissertation Research.
Book
What is Impact Factor * A citation metric * The impact factor of a journal is the average number of citations received per paper published in that journal * The journal must be published in 2 consecutive years, so the IF can be calculated in the 3rd year WHAT DO YOU NEED TO KNOW Example of IF calculation: • In 2008, a journal has an impact factor o...
Article
Full-text available
Information security and confidentiality are the prime concern of any type of communication. The techniques that utilizing inconspicuous digital media such as text, audio, video and image for hiding confidential data in it are collectively called Steganography. The key challenge of steganographic system design is to maintain a fair trade-off betwee...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover im...
Article
Full-text available
Due to sharp increases in data dimensions, working on every data mining or machine learning (ML) task requires more efficient techniques to get the desired results. Therefore, in recent years, researchers have proposed and developed many methods and techniques to reduce the high dimensions of data and to attain the required accuracy. To ameliorate...
Method
Full-text available
Article
Full-text available
The most common cause of death among women globally is breast cancer. One of the key strategies to reduce mortality associated with breast cancer is to develop effective early detection techniques. The segmentation of breast ultrasound (BUS) image in Computer-Aided Diagnosis (CAD) systems is critical and challenging. Image segmentation aims to repr...
Article
Abstract—Handwritten digits recognition is considered as a core to a diversity of emerging application. It is used widely by computer vision and machine learning researchers for performing practical applications such as computerized bank check numbers reading. However, executing a computerized system to carry out certain types of duties is not easy...
Thesis
A fundamental goal of digital image compression is to reduce the bit rate for transmission or data storage while maintaining an acceptable fidelity or image quality. In this thesis a proposed coding (compression) scheme for grey scale image by combining discrete wavelet transform (DWT), multistage vector quantization (MSVQ) and Huffman coding is p...

Questions

Question (1)
Question
If more than one CNNs are used to extract features, is it better to fused them and then make a selection or select the best features then fused them?

Network

Cited By

Projects

Projects (2)
Project
To know the suitability of Activation Functions in Neural Networks