Preferred Language
Articles
/
_BZYWIcBVTCNdQwCikZt
Assessment of Some Enhancement Methods of Renal X-ray Image
...Show More Authors

The study focuses on assessment of the quality of some image enhancement methods which were implemented on renal X-ray images. The enhancement methods included Imadjust, Histogram Equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE). The images qualities were calculated to compare input images with output images from these three enhancement techniques. An eight renal x-ray images are collected to perform these methods. Generally, the x-ray images are lack of contrast and low in radiation dosage. This lack of image quality can be amended by enhancement process. Three quality image factors were done to assess the resulted images involved (Naturalness Image Quality Evaluator (NIQE), Perception based Image Quality Evaluator (PIQE) and Blind References Image Spatial Quality Evaluator (BRISQE)). The quality of images had been heightened by these methods to support the goals of diagnosis. The results of the chosen enhancement methods of collecting images reflected more qualified images than the original images. According to the results of the quality factors and the assessment of radiology experts, the CLAHE method was the best enhancement method.

Scopus Crossref
View Publication
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 31 2020
Journal Name
International Journal Of Heat And Technology
Enhancement of Natural Convection Heat Transfer of Hybrid Design Heat Sink
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Global Journal Of Bio-science And Biotechnology
Efficiency of different denture disinfection methods
...Show More Authors

Dentures that are not cleaning and maintained properly may prone to contamination by different microbial pathogens that result in several oral conditions. This study was design to compare the antimicrobial effect of different denture cleansers oxalic, tartaric, citric acids and alkaline peroxide with microwave irradiation on the growth of Candida albicans and Staphylococcus aureus respectively. Microwave oven used to disinfect specimens of heat-activated acrylic resin and soft linear. Oxalic, citric, tartaric acids, and alkaline peroxide were also used. Microorganisms that tested were Candida albicans and Staphylococcus aureus separately. Treatment with microwave or tartaric acid could achieve sterilization of both hot cured acrylic resins

... Show More
Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Methods of Arab TV Programs Production
...Show More Authors

This research investigates the methods of producing Investigative Arabic Television Programs that are able to prove its existence during a short period of time as a form of Television programs on Arab satellite channels growing in number and varied in content. The research aims to present qualitative and quantitative descriptions of the methods used in tackling the topics discussed in the program, and knowing whether they satisfy the conditions and scientific foundations for the research, investigation, analysis, and interpretation. The researcher uses the survey method and uses the tool of content analysis including a set of methodological steps that seek to discover the implied meaning of the research sample represented by the program

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Simplification of new fashion design methods
...Show More Authors

Simplification of new fashion design methods

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Enhancement In Ballistic Performance Of Composite Armor Through Nano Ceramic
...Show More Authors

In this study, industrial fiber and polymer mixtures were used for high-speed impact (ballistic) applications where the effects of polymer (epoxy), polymeric
mixture (epoxy + unsaturated polyester), synthetic rubber (polyurethane), Kevlar fiber, polyethylene fiber (ultra High molecular weight) and carbon fiber.
Four successive systems of samples were prepared. the first system component made of (epoxy and 2% graphene and 20 layer of fiber), then ballistic test was
applied, the sample was successful in the test from a distance of 7 m. or more than, by using a pistol personally Glock, Caliber of 9 * 19 mm. The second
system was consisting of (epoxy, 2% graphene, 36 layers of fiber and one layer of hard rubber), it was succeeded

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref