Preferred Language
Articles
/
HBZNj4oBVTCNdQwCl5-B
The Use of Gradient Based Features for Woven Fabric Images Classification
...Show More Authors

Crossref
View Publication
Publication Date
Fri Sep 02 2022
Journal Name
Journal Of Legal Sciences
The legality of the use of cyber-attacks in international conflicts and international responsibility for them
...Show More Authors

The emergence of the computer and the expansion of the use of the Internet in all areas of life The various negative effects and risks arising from this expansion will appear, as the greater the reliance On these technologies in development, the greater the risks associated with protecting information, and with increasing Global reliance on information and communication technology, especially with regard to the governmental aspect Countries are vulnerable to attacks through cyberspace, as it has become and public facilities, it has also increased This space is vulnerable to violations by network intruders, whether they are countries, organizations or individuals. Hence, it has become necessary to research the legality of using this type

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Segmenting the Dermatological Diseases Images by Developing the Range Operator
...Show More Authors

Medical image segmentation is a frequent processing step in image medical understanding and computer aided diagnosis. In this paper, development of range operator in image segmentation is proposed depending on dermatology infection. Three different block sizes have been utilized on the range operator and the developed ones to enhance the behavior of the segmentation process of medical images. To exploit the concept of range filtering, the extraction of the texture content of medical image is proposed. Experiment is conducted on different medical images and textures to prove the efficacy of our proposed filter was good results.

View Publication Preview PDF
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The use of standard rates in the test of the financial stability for the banking sector in Iraq For the period 2009-2013
...Show More Authors

ABSTRACT

The research focuses on the key issue concerning the use of the best ways to test the financial stability in the banking sector, considering that financial stability cannot be achieved unless  the financial sector in general and the banking sector  in particular are able to perform its key role in addressing the economic and social development requirements, under the laws and regulations that control  banking sector , as the only way that increases its ability to deal with any risks or negative effects experienced by banks and other financial institutions. The research goal is  to evaluate the stability of the banking system in Iraq, through the use of a set of econometrics an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
The use of laurylamine hydrocholoride CH3(CH2)11 NH3 –Cl for secondary oil recovery
...Show More Authors

Laurylamine hydrochloride CH3(CH2)11 NH3 – Cl has been chosen from cationic surfactants to produce secondary oil using lab. model shown in fig. (1). The relationship between interfacial tension and (temperature, salinity and solution concentration) have been studied as shown in fig. (2, 3, 4) respectively. The optimum values of these three variables are taken (those values that give the lowest interfacial tension). Saturation, permeability and porosity are measured in the lab. The primary oil recovery was displaced by water injection until no more oil can be obtained, then laurylamine chloride is injected as a secondary oil recovery. The total oil recovery is 96.6% or 88.8% of the residual oil has been recovered by this technique as shown

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Prepodavatel Xxi Vek
The Structure of Russian Participles: Special Features of the Grammar Meaning of State
...Show More Authors

View Publication
Crossref
Publication Date
Wed Dec 23 2020
Journal Name
2020 International Conference On Advanced Science And Engineering (icoase)
A Comparative Study Using LZW with Wavelet or DCT for Compressing Color Images
...Show More Authors

As a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
College Of Islamic Sciences
Features of visual formation in the poetry of the poets of the Umayyad era
...Show More Authors

Abstract

The Umayyad poets tried to invest all artistic tools in order to achieve a measure of creativity in their texts. The phenomenon of visual composition is breaking the familiar writing system, with the aim of increasing the number of possible connotations. The visual in the Umayyad poetry tries to replace it through expression with the visual image, and its manifestations were manifested by the multiplication of punctuation marks in the body of the poetic text and the tearing of the single poetic line by cutting it into several sentences or repetition.

Keywords: visual formation, poetic writing, Umayyad poetry, recipien

View Publication Preview PDF
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
The Effect of Classification Methods on Facial Emotion Recognition ‎Accuracy
...Show More Authors

The interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm

... Show More
View Publication Preview PDF
Crossref (2)
Crossref