Preferred Language
Articles
/
BRcvMI8BVTCNdQwC9V9x
Hierarchal Polynomial Coding of Grayscale Lossless Image Compression
...Show More Authors

Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 03 2022
Journal Name
Multimedia Tools And Applications
Boosting Marine Predators Algorithm by Salp Swarm Algorithm for Multilevel Thresholding Image Segmentation
...Show More Authors

View Publication
Scopus (51)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Oct 09 2024
Journal Name
Engineering, Technology & Applied Science Research
Improving Pre-trained CNN-LSTM Models for Image Captioning with Hyper-Parameter Optimization
...Show More Authors

The issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
The effect of the activation functions on the classification accuracy of satellite image by artificial neural network
...Show More Authors

View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Aesthetics of the Sufi Image and its Representations in Post-Modern Theater Show: فرحان عمران موسى
...Show More Authors

  Sufism has aesthetic signs linked to the human spirit and adopts a set of spiritual, motor and tonal practices, let alone the philosophical aspects that have been tackled in the epics, novels and theatrical texts, the theatrical show can recall the Sufi image and its aesthetics within the operating and image system of the theatrical show.. The research problem resides in how to employ the Sufi image in the theatrical show. The research consists introduction of the research subject, the problem, the importance, and objectives represented by uncovering the aesthetic and intellectual representations of the Sufi image in the theatrical show. the theoretical foundation within two sections: the first highlighted the concept of (Sufism a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 02 2014
Journal Name
Journal Of The Islamic University College
The image of the family in dubbed Turkish series and their potential impact on Iraqi youth
...Show More Authors

Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th

... Show More
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Implementation of Digital Image processing in Calculating Normal Approach for Spherical Indenter Considering Elastic/Plastic Contact
...Show More Authors

In this work a study and calculation of the normal approach between two bodies, spherical and rough flat surface, had been conducted by the aid of image processing technique. Four kinds of metals of different work hardening index had been used as a surface specimens and by capturing images of resolution of 0.006565 mm/pixel a good estimate of the normal approach may be obtained the compression tests had been done in strength of material laboratory in mechanical engineering department, a Monsanto tensometer had been used to conduct the indentation tests.
A light section measuring equipment microscope BK 70x50 was used to calculate the surface parameters of the texture profile like standard deviation of asperity peak heights, centre lin

... Show More
View Publication Preview PDF
Crossref