Preferred Language
Articles
/
YBaptYcBVTCNdQwCoF4w
Analysing of Hueckel Edge Detector Performance Using Satellite Image
...Show More Authors

In this research, an analysis for the standard Hueckel edge detection algorithm behaviour by using three dimensional representations for the edge goodness criterion is presents after applying it on a real high texture satellite image, where the edge goodness criterion is analysis statistically. The Hueckel edge detection algorithm showed a forward exponential relationship between the execution time with the used disk radius. Hueckel restrictions that mentioned in his papers are adopted in this research. A discussion for the resultant edge shape and malformation is presented, since this is the first practical study of applying Hueckel edge detection algorithm on a real high texture image containing ramp edges (satellite image).

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
Manifestations of Media Incitement to Violence in Iraqi Satellite Channels- Out of the Iraqi Media's View.
...Show More Authors

representing the media and communication problems and phenomena fertile material and of great importance in the media research, especially as they relate to various aspects of life and its impact on the culture of the community and on individuals and public opinion about the behavior of the various issues. The media incitement to violence and hatred of the most prominent media phenomena that increased the danger and expanded not at the local level, but also in the world. So we found it is important to study this problem from the standpoint of academic and professional. And according to the progress of this research is trying to answer a number of questions including:
A. What are the Iraqi Satellite TV channels most watched and follow

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 25 2012
Journal Name
Journal Of Chromatographic Science
Direct Acetylation and Determination of Chlorophenols in Aqueous Samples by Gas Chromatography Coupled with an Electron-Capture Detector
...Show More Authors

A method was developed that offers a rapid, simple and accurate technique for the determination of chlorophenols at trace levels in aqueous samples with very limited volumes of organic solvents. These compounds were acetylated, then preliminarily extracted with n-hexane. The enriched chlorophenols were directly analyzed using gas chromatography with an electron-capture detector. The detection limits were in the range of 0.001–0.005 mg/L, except for 2-chlorophenol, which was always above 0.013 mg/L. Relative standard deviation for the spiked water samples ranged from 2.2 to 6.1%, while relative recoveries were in the range of 67.1 to 101.3%.

View Publication
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Microchemical Journal
A flow analysis system integrating an optoelectronic detector for the quantitative determination of active ingredients in pharmaceutical formulations
...Show More Authors

View Publication Preview PDF
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

Crossref (1)
Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Diyala Journal For Pure Science
Correlated Hierarchical Autoregressive Models Image Compression
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2007
Journal Name
2007 Ieee International Conference On Signal Processing And Communications
Fast Multi-level Image Vector Quantization
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF