Preferred Language
Articles
/
_xaw04cBVTCNdQwC_2jD
Calculation of Salinity and Soil Moisture indices in south of Iraq - Using Satellite Image Data
...Show More Authors

A band rationing method is applied to calculate the salinity index (SI) and Normalized Multi-Band Drought Index (NMDI) as pre-processing to take Agriculture decision in these areas is presented. To separate the land from other features that exist in the scene, the classical classification method (Maximum likelihood classification) is used by classified the study area to multi classes (Healthy vegetation (HV), Grasslands (GL), Water (W), Urban (U), Bare Soil (BS)). A Landsat 8 satellite image of an area in the south of Iraq are used, where the land cover is classified according to indicator ranges for each (SI) and (NMDI).

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Concentrations and Radiation Hazard Indices of Naturally Radioactive Materials for Flour Samples in Baghdad Markets
...Show More Authors

In the present work, Uranium (238U), Thorium (232Th) and Potassium (40K) specific activity concentration in (Bq/kg) was measured in five different types for wheat flours that are available in the Iraqi markets. The gamma spectrometry method with an NaI (Tl) detector has been used for radiometric measurements. Calculations of radium equivalent activity, annual effective dose equivalent, external hazard index (Hex), internal hazard index (Hin), representing gamma index and gamma dose rate in all  flour samples were 17.98132 Bq/kg, 0.0100334, 0.04502, 0.04857, 0.06872, 0.125883 and 8.181244 respectively. It is found that the average of specific activity concentration of wheat flour sam

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 06 2025
Journal Name
Al–bahith Al–a'alami
Technical Processing of documentary programs in satellite channels
...Show More Authors

The current research dealt with the study and analysis of the documentary
program on RT satellite channel dealt with research in a problem identified
by the researcher in a major question, which is the methods of technical
processing of documentary programs in satellite channels? The goal of
identifying the channel's handling of its documentary programs.
The research is considered descriptive research in which the researcher
used the survey method, the content analysis method to analyze (12)
documentary programs, It was determined by the comprehensive inventory
method within the temporal field of research extending from 1/10/2019 to
29/12/2019.
The researcher has obtained several results, the most important

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering
Assessing the Moisture and Aging Susceptibility of Cold Mix Asphalt Concrete
...Show More Authors

Laboratory experience in Iraq with cold asphalt concrete mixtures is very limited. The design and use of cold mixed asphalt concrete had no technical requirements. In this study, two asphalt concrete mixtures used for the base course were prepared in the laboratory using conventional cold-mixing techniques to test cold asphalt mixture (CAM) against aging and moisture susceptibility. Cold asphalt mixtures specimens have been prepared in the lab with cutback and emulsion binders, different fillers, and curing times. Based on the Marshal test result, the cutback proportion was selected with the filler, also based on the Marshal test emulsion. The first mixture was medium setting cationic emulsion (MSCE) as a binder, hydrate

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref