Preferred Language
Articles
/
HRdAMI8BVTCNdQwC5F-0
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
Scopus Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The extent of the industrial company's response to blue market strategy indicators: Applied research
...Show More Authors

The current research aims to describe the level of responsiveness and awareness of the officials of the General Company for Construction Industries to the indicators of the blue market strategy of (1. reduction 2. exclusion 3. increase 4. innovation) and the degree of prioritization according to their importance as well as the differences in the responses of the sample investigated according to the personal variables. As a main tool in the collection of data from the sample, which consisted of(34) officers (Associate, Manager, Section Manager, Division Officer) in the company being investigated, and computed mean, standard deviations, percentage weights,and test (x2 )  based on the SPSS. The research reached the following

... Show More
View Publication
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Loading and Activating a Carbon Surface and Applied for Congo Red Adsorption, Kinetic Study
...Show More Authors
Abstract<p>this paper contains preparation of Active carbon surface (AC) from pro so millet grain husks and Loading and activating by Iron oxide and hydrogen peroxide sequentially to obtain surface (ACIPE). The changes of previous processes on Active carbon surface were diagnosed by Fourier transform infrared spectroscopy (FTIR) and Scanning electron microscopy ( SEM ). These surfaces (AC and ACIPE ) were using as adsorbent for removing of congo red dye from aqueous solutions under certain conditions through batch system. More than one kinetic model was applied to congo red dye adsorption process and it was found that the most kinetic model applied to it is a model ( pseudo second order model). </p> ... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences &amp; Humanities
The House of Bernarda Alba: The Image of Repression and Female Rebellion Through the Character of Adela
...Show More Authors

In the present work, the image and representation of Adela, the youngest daughter of the family of the Casa de Bernarda Alba, one of the most popular works of the Spanish author Federico García Lorca (1898-1936), will be analyzed. In this work, there are different themes, but what concerns us is to show the repression, oppression and rebellion of this character in a context of customs of the 1920s in Spain. They are revealing elements in that period in which women were relegated to the background, despite the fact that a feminist movement had already begun in Spain. By studying Adela, we seek to see how a single woman confronts her family and the society that surrounds her to fight for freedom, although its end is finally linked to

... Show More
View Publication
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Automatic Computer Aided Diagnostic for COVID-19 Based on Chest X-Ray Image and Particle Swarm Intelligence
...Show More Authors

View Publication
Scopus (23)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
The effect of the activation functions on the classification accuracy of satellite image by artificial neural network
...Show More Authors

View Publication
Scopus (19)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Using Texture Analysis Image Processing Technique to Study the Effect of Microwave Plasma on the Living Tissue
...Show More Authors

The present study is a hybrid method of studying the effect of plasma on the living tissue by using the image processing technique. This research explains the effect of microwave plasma on the DNA cell using the comet score application, texture analysis image processing and the effect of microwave plasma on the liver using texture analysis image processing. The study was applied on the mice cells. The exposure to the plasma is done by dividing the mice for four groups, each group includes four mice (control group, 20, 50, 90 second exposure to microwave plasma). The exposure to microwave plasma was done with voltage 175v and gas flow on 2 with room temperature; the statistical features are obtained from the comet score images and the textur

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF