Preferred Language
Articles
/
WRgPYZQBVTCNdQwCtRRP
Perturbation iteration transform method for solving fractional order integro-differential equation
...Show More Authors

Crossref
View Publication
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Survey of Scale-invariant Feature Transform Algorithm
...Show More Authors

The effectiveness of detecting and matching of image features using multiple views of a specified scene using dynamic scene analysis is considered to be a critical first step for many applications in computer vision image processing. The Scale invariant feature transform (SIFT) can be applied very successfully of typical images captured by a digital camera.
In this paper, firstly the SIFT and its variants are systematically analyzed. Then, the performances are evaluated in many situations: change in rotation, change in blurs, change in scale and change in illumination. The outcome results show that each algorithm has its advantages when compared with other algorithms

View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
3D Model Watermarking based on Wavelet Transform
...Show More Authors

      In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluati

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Transform Fundamental Properties and Its Applications
...Show More Authors

        In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.

Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.

View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
The Use of First Order Polynomial with Double Scalar Quantization for Image Compression
...Show More Authors

Publication Date
Tue May 01 2012
Journal Name
2012 Second International Conference On Digital Information And Communication Technology And It's Applications (dictap)
The compact Genetic Algorithm for likelihood estimator of first order moving average model
...Show More Authors

Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Iecon 2017 - 43rd Annual Conference Of The Ieee Industrial Electronics Society
Optimal second order integral sliding mode control for a flexible joint robot manipulator
...Show More Authors

The flexible joint robot manipulators provide various benefits, but also present many control challenges such as nonlinearities, strong coupling, vibration, etc. This paper proposes optimal second order integral sliding mode control (OSOISMC) for a single link flexible joint manipulator to achieve robust and smooth performance. Firstly, the integral sliding mode control is designed, which consists of a linear quadratic regulator (LQR) as a nominal control, and switching control. This control guarantees the system robustness for the entire process. Then, a nonsingularterminal sliding surface is added to give a second order integral sliding mode control (SOISMC), which reduces chartering effect and gives the finite time convergence as well. S

... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Crossref
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Calculation of The Binding And Excitation Energies For 𝐍𝐢 𝟐𝟖 𝟓𝟖 30 Using Shell Model And Perturbation Theory
...Show More Authors

    A theoretical calculation of the binding and excitation energies have been used at low – lying energies based on shell model and quantum theory. In this model, we evaluated the energies under assume Ni 28 56 30 as inert core with two nucleon extra, nucleons in the  2P3/2 ,  1f 5/2  and 2P1/2  configuration. Modified Surface Delta Interaction (MSDI) and Reid's Potential (RP) theory for two body matrix elements are evaluated by using a Matlab program to calculate the energies of experimental and Reid single particle energies. Our results of the theoretical calculation have been compared with the experimental results, which show no good agreement with the experiment but have a good agreement wit

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Alexandria Engineering Journal
The operational matrix of Legendre polynomials for solving nonlinear thin film flow problems
...Show More Authors

View Publication
Crossref (5)
Crossref