Preferred Language
Articles
/
4BZdmYcBVTCNdQwCLFe7
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute difference (AD) and compared with the overall average of precision and recall.

Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة العدد الخاص بمؤتمر الكلية
A propose method for hiding image into image
...Show More Authors

Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
COVID-19 Diagnosis System using SimpNet Deep Model
...Show More Authors

After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings

... Show More
View Publication Preview PDF
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Medical Image Compression using Wavelet Quadrants of Polynomial Prediction Coding & Bit Plane Slicing
...Show More Authors

Publication Date
Tue Aug 10 2021
Journal Name
Design Engineering
Lossy Image Compression Using Hybrid Deep Learning Autoencoder Based On kmean Clusteri
...Show More Authors

Image compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye

... Show More
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Risks assessment for the retrieval of radioactive waste from the old Russian cemetery Al -Tuwaitha site
...Show More Authors

In this work the radioactive wastes in the Old Russian
Cemetery Al -Tuwaitha site were classified according to risks for
workers who are involved in the retrieval process. The exposure
assessment results expressed as estimates of radionuclide intakes by
inhalation and ingestion, exposure rates and duration for external
exposure pathways, and committed effective dose equivalents to
individuals from all relevant radionuclides and pathways. Results
showed the presence of natural radionuclides Ra-226, Th-234 and K-
40, as well as the produced radionuclide Cs-137 and Eu-152 in the
cemetery wells. The absorbed doses from the waste were classified to
two categories; exempt waste and low level waste according to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref