{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:31Z","timestamp":1750220551500,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,26]]},"DOI":"10.1145\/3440749.3442641","type":"proceedings-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T21:44:37Z","timestamp":1620942277000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Canny edge detection towards deep learning Arabic document classification"],"prefix":"10.1145","author":[{"given":"Taghreed","family":"Alghamdi","sequence":"first","affiliation":[{"name":"University of Jeddah"}]},{"given":"Samia","family":"Snoussi","sequence":"additional","affiliation":[{"name":"University of Jeddah"}]},{"given":"Lobna","family":"Hsairi","sequence":"additional","affiliation":[{"name":"University of Jeddah and Tunis ElManar University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"volume-title":"Retrieved","year":"2016","author":"John Mancini","key":"e_1_3_2_2_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1134\/S105466181704006X"},{"volume-title":"Introduction to document analysis and recognition. In\u00a0 Machine learning in document analysis and recognition\u00a0(pp. 1-20)","year":"2008","author":"Marinai S.","key":"e_1_3_2_2_3_1"},{"volume-title":"Deep learning for Arabic NLP: A survey.\u00a0 Journal of computational science,\u00a026, 522-531.\u200f","year":"2018","author":"Al-Ayyoub M.","key":"e_1_3_2_2_4_1"},{"volume-title":"In\u00a02017 International Conference on Mathematics and Information Technology (ICMIT)\u00a0(pp. 134-140)","year":"2017","author":"Yamina O. J.","key":"e_1_3_2_2_5_1"},{"volume-title":"A novel method for the recognition of isolated handwritten Arabic characters.\u00a0 arXiv preprint arXiv:1402.6650.\u200f","year":"2014","author":"Sahlol A.","key":"e_1_3_2_2_6_1"},{"volume-title":"Deep learning algorithms for arabic handwriting recognition: A review.\u00a0 International Journal of Engineering & Technology,\u00a07 (3.20).\u200f","year":"2018","author":"Saffar A.","key":"e_1_3_2_2_7_1"},{"volume-title":"An analytical study of information extraction from unstructured and multidimensional big data.\u00a0 Journal of Big Data,\u00a06 (1), 91.\u200f","year":"2019","author":"Adnan K.","key":"e_1_3_2_2_8_1"},{"volume-title":"In\u00a02019 International Artificial Intelligence and Data Processing Symposium (IDAP)\u00a0(pp. 1-6). IEEE.\u200f","year":"2019","author":"Ucuzal H.","key":"e_1_3_2_2_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1007\/978-0-387-73003-5_223"},{"volume-title":"Deep learning and transfer learning approaches for image classification.\u00a0International Journal of Recent Technology and Engineering (IJRTE),\u00a07(5S4), 427-432.\u200f","year":"2019","author":"Krishna S. T.","key":"e_1_3_2_2_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.1109\/ACCT.2014.74"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1109\/ICoAC.2017.8441512"},{"volume-title":"Convolutional neural networks: an overview and application in radiology.\u00a0Insights into imaging,\u00a09(4), 611-629.\u200f","year":"2018","author":"Yamashita R.","key":"e_1_3_2_2_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1109\/ICDAR.2015.7333910"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1109\/DICTA.2016.7797053"},{"volume-title":"Classification of image using convolutional neural network (CNN).\u00a0 Global Journal of Computer Science and Technology.\u200f","year":"2019","author":"Hossain M. A.","key":"e_1_3_2_2_17_1"},{"volume-title":"In\u00a0Science and Information Conference\u00a0(pp. 128-144)","year":"2019","author":"O'Mahony N.","key":"e_1_3_2_2_18_1"},{"key":"e_1_3_2_2_19_1","article-title":"Automated edge detection using convolutional neural network.\u00a0Int","author":"El-Sayed M. A.","year":"2013","journal-title":"J. Adv. Comput. Sci. Appl.(IJACSA),\u00a04(10).\u200f"},{"volume-title":"Edge detection operators: Peak signal to noise ratio based comparison.\u00a0IJ Image, Graphics and Signal Processing,\u00a010, 55-61.\u200f","year":"2014","author":"Poobathy D.","key":"e_1_3_2_2_20_1"},{"volume-title":"Performance analysis of canny and sobel edge detection algorithms in image mining.\u00a0International Journal of Innovative Research in Computer and Communication Engineering,\u00a01(8), 1760-1767.\u200f","year":"2013","author":"Vijayarani S.","key":"e_1_3_2_2_21_1"},{"issue":"19","key":"e_1_3_2_2_22_1","first-page":"6517","article-title":"Comparative study among Sobel, Prewitt and Canny edge detection operators used in image processing.\u00a0J","volume":"96","author":"Ahmed A. S.","year":"2018","journal-title":"Theor. Appl. Inf. Technol,\u00a0"},{"volume-title":"S and Smitha Vas P","year":"2018","author":"Pooja A.","key":"e_1_3_2_2_23_1"},{"volume-title":"Applied Deep Learning - Part 4: Convolutional Neural Networks. (November","year":"2017","author":"Arden Dertat","key":"e_1_3_2_2_24_1"},{"unstructured":"IFN\/ENIT - database Arabic OCR handwritten arabic word recognition Arabic database. http:\/\/www.ifnenit.com\/  IFN\/ENIT - database Arabic OCR handwritten arabic word recognition Arabic database. http:\/\/www.ifnenit.com\/","key":"e_1_3_2_2_25_1"},{"unstructured":"KAHTT Database. http:\/\/khatt.ideas2serve.net\/  KAHTT Database. http:\/\/khatt.ideas2serve.net\/","key":"e_1_3_2_2_26_1"},{"unstructured":"ALPH-REGIM-database. https:\/\/ewh.ieee.org\/r8\/tunisia\/regim\/alph_regim\/  ALPH-REGIM-database. https:\/\/ewh.ieee.org\/r8\/tunisia\/regim\/alph_regim\/","key":"e_1_3_2_2_27_1"}],"event":{"acronym":"ICFNDS '20","name":"ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems","location":"St.Petersburg Russian Federation"},"container-title":["The 4th International Conference on Future Networks and Distributed Systems (ICFNDS)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440749.3442641","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3440749.3442641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:18Z","timestamp":1750195698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440749.3442641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"references-count":27,"alternative-id":["10.1145\/3440749.3442641","10.1145\/3440749"],"URL":"https:\/\/doi.org\/10.1145\/3440749.3442641","relation":{},"subject":[],"published":{"date-parts":[[2020,11,26]]},"assertion":[{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}