Preferred Language
Articles
/
4RcHMI8BVTCNdQwCFV6Y
Fixed Predictor Polynomial Coding for Image Compression
...Show More Authors

Crossref
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Chemical Engineering And Processing - Process Intensification
Cobalt Removal from Simulated Wastewaters Using a Novel Flow-by Fixed Bed Bio-electrochemical Reactor
...Show More Authors

View Publication
Scopus (33)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effects of fixed orthodontic appliance with antihypertensive drugs on the body weight of experimental rats
...Show More Authors

Background: This study aims to investigate the effect of fixed orthodontic appliances and/or antihypertensive drugs on the weight of experimental rats. Materials and Methods: Thir-ty-six male Wistar albino rats were subjected to a split-mouth design study, in which an orthodontic appliance was inserted in one side to move the first molar mesially for 2 weeks while the other side acted as a control to tooth movement. The rats were allocated into three groups: group A (n = 12), without any pharmacological treatment; group B (n = 12), subcu-taneous injection of bisoprolol fumarate (5 mg/kg) daily; and group C (n = 12), subcutaneous injection of valsartan (10 mg/kg) daily. A fixed orthodontic appliance with a closing coil spring delivering 5

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancing Nitrate Ion Removal from Water using Fixed Bed Columns with Composite Chitosan-based Beads
...Show More Authors

    Water contamination is a pressing global concern, especially regarding the presence of nitrate ions. This research focuses on addressing this issue by developing an effective adsorbent for removing nitrate ions from aqueous solutions. two adsorbents Chitosan-Zeolite-Zirconium (Cs-Ze-Zr composite beads and Chitosan-Bentonite-Zirconium Cs-Bn-Zr composite beads were prepared. The study involved continuous experimentation using a fixed bed column with varying bed heights (1.5 and 3 cm) and inlet flow rates (1 and 3 ml/min). The results showed that the breakthrough time increased with higher bed heights for both Cs-Ze-Zr and Cs-Bn-Zr composite beads. Conversely, an increase in flow rate led to a decrease in breakthrough time. Notab

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
CFD Simulation of Methanol Dehydration Step through an Adiabatic Fixed-bed Reactor of DME Synthesis
...Show More Authors

   Today, dimethyl ether (DME) is changing to ordinarily worn as a superb aerosol propellant and refrigerant for its eco-friendly characteristics. Lately, with the development of novel chemical energy in the coal industries, it has become a fascinating field of research as an alternative green fuel for diesel machines due to the high cetane number. The DME synthesis processes include catalytic dehydrating methanol in an adiabatic fixed-bed reactor. In this study, to investigate the chemical conditions of the methanol dehydration reaction, CFD simulations of the adiabatic reactor have been assessed. The advantage of the work is a sensitivity analysis was run to find the effect of pressure, kinetics, and velocity on the reactor performan

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Ieee Transactions On Human-machine Systems
Myoelectric Control With Fixed Convolution-Based Time-Domain Feature Extraction: Exploring the Spatio–Temporal Interaction
...Show More Authors

View Publication
Scopus (30)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF