Preferred Language
Articles
/
2hgfHJcBVTCNdQwCE5Ws
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discusses the benefits and limitations of each technique, emphasizing their efficacy in addressing various kinds of images and the dares they face in complex environs. This article offers a comparative analysis of the numerous approaches utilized in edge detection, which assistances in selecting the suitable technique according to the requirements of applications, like video processing, object recognition, medical image analysis, and computer vision.

Crossref
View Publication
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of Sustainable Studies
A Socio-Pragmatic Study of Insulting in English News
...Show More Authors

Media has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use

... Show More
Preview PDF
Publication Date
Wed Sep 07 2016
Journal Name
Journal Of The Faculty Of Medicine
Non discogenic lumbar radiculopathy ((A study of 104 cases))
...Show More Authors

AW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Bulletin Of The Iraq Natural History Museum
A SURVEY OF GASTROPODS IN THE GREENHOUSES OF IRAQ
...Show More Authors

The humid and warm conditions in greenhouses provide an excellent environment for pests’ living conditions, and therefore, they provide ideal medium for alien introductions. Molluscs are among the most significant pests that infest plastic covered greenhouses. To identify and report their mollusc species, 23 greenhouses in Iraq were surveyed between March 2023 and April 2024. Of these, 11 were found to be infested with snails. A total of 158 specimens were collected and morphologically identified to seven species: Monacha obstructa (L. Pfeiffer, 1842), Eobania vermiculata (O.F. Müller, 1774), Xeropicta krynickii (Krynicki, 1833), Rumina decollata (Linnaeus, 1758), Polygyra cereolus (Megerle Von Mühlfeld, 1818), Cochlicella barba

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Alexandria Engineering Journal
A new tilted aerial robotic platform: Modeling and control
...Show More Authors

View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
A Survey Study and Comparison of Drones Communication Systems
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref