Preferred Language
Articles
/
PhdVMI8BVTCNdQwCil_C
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Speech Emotion Recognition Using MELBP Variants of Spectrogram Image
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Satellite Image Mosaics Using Digital Cosine Transform (DCT) Descriptor
...Show More Authors

In this research work, a modified DCT descriptor are presented to mosaics the satellite images based on Abdul Kareem [1] similarity criterion are presented, new method which is proposed to speed up the mosaics process is presented. The results of applying the modified DCT descriptor are compared with the mosaics method using RMSE similarity criterion which prove that the modified DCT descriptor to be fast and accurate mosaics method.

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Analysing of Hueckel Edge Detector Performance Using Satellite Image
...Show More Authors

In this research, an analysis for the standard Hueckel edge detection algorithm behaviour by using three dimensional representations for the edge goodness criterion is presents after applying it on a real high texture satellite image, where the edge goodness criterion is analysis statistically. The Hueckel edge detection algorithm showed a forward exponential relationship between the execution time with the used disk radius. Hueckel restrictions that mentioned in his papers are adopted in this research. A discussion for the resultant edge shape and malformation is presented, since this is the first practical study of applying Hueckel edge detection algorithm on a real high texture image containing ramp edges (satellite image).

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Orthogonal Functions Solving Linear functional Differential EquationsUsing Chebyshev Polynomial
...Show More Authors

A method for Approximated evaluation of linear functional differential equations is described. where a function approximation as a linear combination of a set of orthogonal basis functions which are chebyshev functions .The coefficients of the approximation are determined by (least square and Galerkin’s) methods. The property of chebyshev polynomials leads to good results , which are demonstrated with examples.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Journal Of Engineering
Monitoring Land Cover Change Using Remote Sensing and GIS Techniques: a Case Study of Al-Dalmaj Marsh, Iraq
...Show More Authors

Al-Dalmaj marsh and the near surrounding area is a very promising area for energy resources, tourism, agricultural and industrial activities. Over the past century, the Al-Dalmaje marsh and near surroundings area endrous from a number of changes. The current study highlights the spatial and temporal changes detection in land cover for Al-Dalmaj marsh and near surroundings area using different analyses methods the supervised maximum likelihood classification method, the Normalized  Difference Vegetation Index (NDVI), Geographic Information Systems(GIS),  and Remote Sensing (RS). Techniques spectral indices were used in this study to determine the change of wetlands and drylands area and of other land classes, th

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
How geometric reverse engineering techniques can conserve our heritage; a case study in Iraq using 3D laser scanning
...Show More Authors
Abstract<p>Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte</p> ... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref