Preferred Language
Articles
/
HxZkxIsBVTCNdQwCDt1R
Single image dehazing by dark channel prior and luminance adjustment
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
News coverage of Arab revolutions in satellite channels An analytical study of the news bulletins in Al - Tijah satellite channel
...Show More Authors

The news media material to any means of mass media, and increasingly

 important in TV; what the associated word and image effects, which do different cover events (political, economic, sports, and social .... etc.) directly from the event site and gather the news and do prepared formulation and arranged within the framework provided by the newsletter, as it requires the viewer to provide the public with information about this news correlated; to achieve the greatest gravity following the shapes and styles and technical fees (Alkraveks) during the submission. What we are witnessing today from technological developments help existing staff to cover the news activity quickly and efficiently prohibitivel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Al–bahith Al–a'alami
The Visual intertextuality of normalization with Israel in websites of oriented satellite channels: An Analytical study of Al Hurrah Channel
...Show More Authors

The research aims to reveal the methods of visual intertextuality used in the websites of the oriented satellite channel which is Arabic-speaking when addressing normalization with Israel. It also indicates the sources and types of intertextual images, the methodological and semiotic mechanisms for analyzing the intertextuality of news images used on the website of Alhurra satellite channel for the period from 1/6 - 30/8/2022, which included (94) images. The researcher analyzed (37) images with intertextual dimensions, excluding (57) images, which did not carry connotations connected with the inputs and objectives of the research.

The research reach

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 10 2019
Journal Name
Al-mustansiriyah Journal Of Science
Effect of Inclined Magnetic Field on Peristaltic Flow of Carreau Fluid through Porous Medium in an Inclined Tapered Asymmetric Channel
...Show More Authors

During this article, we have a tendency to show the peristaltic activity of magnetohydrodynamics flow of carreau fluid with heat transfer influence in an inclined tapered asymmetric channel through porous medium by exploitation the influence of non-slip boundary conditions. The tapered asymmetric channel is often created because of the intrauterine fluid flow induced by myometrial contraction and it had been simulated by asymmetric peristaltic fluid flow in an exceedingly two dimensional infinite non uniform channel, this fluid is known as hereby carreau fluid, conjointly we are able to say that one amongst carreau's applications is that the blood flow within the body of human. Industrial field, silicon oil is an example of carreau

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Clinical Characteristics and Antibiotics Sensitivity of Culture Positive Typhoid Fever Patients in Baghdad Teaching Hospital - A Single Center Study
...Show More Authors

BACKGROUND: Enteric fever caused by Salmonella Typhi is an endemic disease in Iraq. Variations in presentations make it a diagnostic challenge. If untreated or treated inappropriately then it is a serious disease with potentially life-threatening complications. The recent emergence of drug resistant strains of S. Typhi is a rising public health problem and a clinical concern to the physician. AIM: The objectives of the study were to assess and describe the patterns of antimicrobial resistance, clinical characteristics, epidemiological distribution, and complications of typhoid fever. PATIENTS AND METHODS: Fifty cases of typhoid fever (culture proven) were collected during the period from February 2019 to November 2019 in the me

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Current Sites of Infections and Types of Microorganisms in Patient with Febrile Neutropenia in Hematological Wards – Single Center Study
...Show More Authors

BACKGROUND: Febrile neutropenia occurs in more than 80% of patients with hematological malignances specially after chemotherapy cycles and an infectious source is identified in approximately 20–30%. Various bacterial, viral, and fungal pathogen contribute to the development of neutropenic fever and without prompt antibiotic therapy mortality rate can be as high as 70%. AIM: The objective of the study was to document the current sites of infection in patients with febrile neutropenia in hematological ward in Baghdad Teaching Hospital, the microorganisms and antibiotic susceptibly in culture positive cases and mortality rate in 1 week and 4 weeks after episode of fever. PATIENTS AND METHODS: One hundred cases of febrile neutrop

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Apr 28 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Using Crushed Glass with Sand as a Single and Dual Filter Media for Removal of Turbidity from Drinking Water
...Show More Authors

View Publication
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF