This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute difference (AD) and compared with the overall average of precision and recall.
Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p
... Show MoreIraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for
... Show MoreIn this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
NAA Mustafa, University of Sulaimani, Ms. c Thesis, 2010 - Cited by 4
The investigation of natural convection in an annular space between two concentric cylinders partially filled with metal foam is introduced numerically. The metal foam is inserted with a new suggested design that includes the distribution of metal foam in the annular space, not only in the redial direction, but also with the angular direction. Temperatures of inner and outer cylinders are maintained at constant value in which inner cylinder temperature is higher than the outer one. Naiver Stokes equation with Boussinesq approximation is used for fluid regime while Brinkman-Forchheimer Darcy model used for metal foam. In addition, the local thermal equilibrium condition in the energy e
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreAbstract To ensure that the distribution system has safe drinking water. It is necessary to know the residual chlorine concentrations at various points in the network. A chlorine photometer device was used to measure twenty points taken every day for a week at a selected time in the distribution system. Both pressures and flows in the network were measured using bourdon gauge and Tuf-2000H Handheld Digital ultrasonic flow meters. WaterGEMS CONNECT Edition update one software was used to simulate the flow in the network. The Baghdad water department provided the data about the network, such as the lengths of pipes, the layout of the network, and pipes diameters. The network calibrated consists of 781 pipes of different lengths and 542 juncti
... Show MoreIn this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More