Preferred Language
Articles
/
JhZmxIsBVTCNdQwCvN0E
A review on various methods for dehazing images
...Show More Authors

In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model , therefore, the haze and its model were studied and the research and methods that dealt with the removal of haze were explained and detailed its advantage and disadvantage which is required for further study.

Publication Date
Thu May 14 2015
Journal Name
International Journal Of Computer Applications
Performance Evaluation of Zigbee Routing Protocol under Various Conditions using OPNET Modeler
...Show More Authors

Zigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment of Composite Nanoleakage Using Various Dentine Surface Treatments
...Show More Authors

Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Continuous De-emulsification of Crude Oil Using Packed Column Under Various Conditions
...Show More Authors

This research dealt with desalting of East Baghdad crude oil using pellets of either anionic, PVC, quartz, PE, PP or
nonionic at different temperature ranging from 30 to 80 °C, pH from 6 to 8, time from 2 to 20 minutes, volume percent
washing water from 5 to 25% and fluid velocity from 0.5 to 0.8 m/s under voltage from 2 to 6 kV and / or using additives
such as alkyl benzene sulphonate or sodium stearate. The optimum conditions and materials were reported to remove
most of water from East Baghdad wet crude oil.

View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment of Composite Nanoleakage Using Various Dentine Surface Treatments
...Show More Authors

Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Journal Of Current Medical Research And Opinion
Effect of Educational Programs on MothersKnowledge and Childrens Nutritional Status: Narrative Review
...Show More Authors

Publication Date
Thu Mar 07 2024
Journal Name
Oncology Letters
Effect of valproic acid on histone deacetylase expression in oral cancer (Review)
...Show More Authors

View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri May 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI images using region growing algorithm
...Show More Authors

LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2

View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Process of artistic conception of nature's images Between becoming and buration
...Show More Authors

This research deals with process of artistic conception of nature's images between becoming and buration, as an attempt to transfer the philosophical concepts to art via it's structural applications in forming the picture, due to the importance of these concepts which might be engaged with the vision of the artist in his own and subjective contention with the nature. The research consists of four chapters, first one included the problem of the research, importance, need to the research and the aim of the research represented by process of artistic conception of nature's images between becoming  and buration. Also included the limits of research and most important terms. Second chapter included theoretical frame that consists of thre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref