Preferred Language
Articles
/
YRbmZooBVTCNdQwCvp2p
Performance Study for Mixed Transforms Generated by Tensor Product in Image Compression and Processing
...Show More Authors

In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transform and Slantlet Transform both as 2D matrix but mixed by Tensor Product. The performance parameters such as Compression Ratio, Peak Signal to Noise Ratio, and Root Mean Squared Error, are all evaluated for both standard colored and gray images. The simulation result shows that the techniques provide the quality of the images it was normal but acceptable and need more researchers works.

Publication Date
Sat Apr 01 2023
Journal Name
Biochemical Engineering Journal
Immobilization of mixed cells by Flaxseeds (Linum usitatissimum) extract as new nonconventional biocarrier for biodegradation of sodium dodecyl sulfate
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Fractally Generated Microstrip Bandpass Filter Designs Based on Dual-Mode Square Ring Resonator for Wireless Communication Systems
...Show More Authors

A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Some Properties of Fuzzy Inner Product Space
...Show More Authors

     Our goal in the present paper is to introduce a new type of fuzzy inner product space. After that, to illustrate this notion, some examples are introduced. Then we prove that that every fuzzy inner product space is a fuzzy normed space. We also prove that the cross product of two fuzzy inner spaces is again a fuzzy inner product space. Next, we prove that the fuzzy inner product is a non decreasing function. Finally, if U is a fuzzy complete fuzzy inner product space and D is a fuzzy closed subspace of U, then we prove that U can be written as a direct sum of D and the fuzzy orthogonal complement    of D.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jul 13 2016
Journal Name
International Journal Of Mathematics Trends And Technology
Designed Algorithms for Compute the Tenser Product of Representation for the Special Linear Groups
...Show More Authors

The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.

View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Artistic processing of Emotional Scenes in the Narrative Film
...Show More Authors

This research entitled: "Artistic processing of Emotional Scenes in the Narrative Film" deals with how to process and embody those emotional scenes. As there are certain filmic elements that play an effective role in deepening the viewer's sense of the importance of those scenes, and that their presence in the film is necessary and inevitable, and cannot be dispensed because it forms an interconnected connection with the rest of the film's scenes, in addition to its dramatic and aesthetic value in the film in crystallizing the viewer's feelings and integrating him/her into the scene.
The research was divided into four chapters, the first chapter includes: the methodological framework, which represented the research problem, and brin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
News Processing of Corruption Issues in Iraq Satellite Channels
...Show More Authors

The core idea of this study revolves around the news coverage by Iraqi satellite channels regarding corruption issues and their implications on the public's perception of the political process. The researcher designed a content analysis form encompassing both primary and sub-categories of news bulletins from the channels, Dijlah and Al-Itijah, spanning from 01/06/2021 to 31/08/2021, using a comprehensive enumeration method. The chosen timeframe preceded the parliamentary elections held in October 2021. Employing a descriptive-analytical approach coupled with observation, the researcher derived results that met the study's objectives. Among these findings, news items enhanced with video content topped the categorie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Processing of Crispy Chicken and Studying Its Quality Properties
...Show More Authors

This investigation was carried out to examine the Processing and effect of addition of different spices on the sensory and microbial properties of the Crispy Chicken . The results revealed than that of treatments 1 (without spices control) , 3 (anise ) , 4 (Thyme) , 5 (curry) , 6 (black Pepper) , 7 ( ginger) and 10 ( garlic ) gined higher score of overall acceptance than treatment 8 ( carnation ) . Did not significant difference of overall acceptance , between treatments 1 , 2 ( black seed ) , 3 , 4 , 5 , 6 , 7 , 9 ( onion ) and 10 and between treatments 2 , 8 and 9 . In regards with microbial tests showed aerobic bacteria highest numbers than adding 2, which amounted to more than 300 the unit cell bacterial cfu / ml and less numbers tha

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Derivative of an image that corrupted by additive noise
...Show More Authors

In this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.

View Publication Preview PDF
Crossref