Preferred Language
Articles
/
alkej-559
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

      From the simulation result, it has been found that the reconstructed image is 2X2 larger than the image that found from the inverse without scaling up the coefficients.

      Comparison of image zooming using inverses SLT by box and Bartlett filters, found that, because of the linear interpolation done by using Bartlett the image appears to be smoother than the image obtained using a box filter.

      The performance of these techniques (image zooming using inverse SLT) has been evaluated by computer programs with MATLAB 7.04 (R2007a) language.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the efficiency of quality health services in the province of Karbala: Models using the Data envelopment analysis (DEA)
...Show More Authors

  The research aims to measure  the efficiency of health services Quality  in the province of Karbala, using the Data Envelopment analysis Models in ( 2006). According to these models the degree of efficiency ranging between zero and unity. We estimate Scale efficiency  for two types of orientation direction, which are input and output oriented direction.

  The results showed, according Input-oriented efficiency that the levels of Scale efficiency on average is ( 0.975), in the province of Karbala. While the index of Output-oriented efficiency on average is (o.946).

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Corrosion Inhibition of Medium Carbon Steel in the Acidic Medium Using Alcoholic and Aqueous Extract of Kujarat Tea Plant
...Show More Authors

This study deals with the corrosion inhibition of metal corrosion process of medium carbon steel using 1M HCl for kinetic studies and rate reaction determination. The weight loss method is applied to pieces of Medium carbon steel divided to Cubans with dimensions (0.4*2*2.4) cm , and use Tafel Extrapolation Method, the samples were polished using carbide silicon paper with dimensions of (180,200,400,600,800,1000). The samples were immersed in the alcoholic medium ethanol at a temperature 293K for 3hr. Natural inhibitor Kujarat Tea (Hibiscus sabdarriffa L.) is used which is extracted in aqueous and alcoholic medium, different concentrations (1000،2000, 3000) ppm have been used ; The best concentration found through the results is a conce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 14 2020
Journal Name
Baghdad Science Journal
The Green Synthesize of Zinc Oxide Catalyst Using Pomegranate Peels Extract for the Photocatalytic Degradation of Methylene Blue Dye
...Show More Authors

In this study, the zinc oxide NPs have been synthesized from the fresh pomegranate peels extract using the precipitation method. The ZnO nanoparticles were produced from the reaction of fresh peels extract with zinc acetate salt which was used as zinc source in the presence of 2 M NaOH. The green synthesized nanoparticles were characterized through X-ray diffraction (XRD), UV-Vis diffuse reflection spectroscopy, Fourier transform infrared spectroscopy (FTIR), and Atomic force microscopy (AFM). The XRD patterns confirm the formation of hexagonal wurtzite phase structure for ZnO synthesized using pomegranate peels extract with average crystalline size of 28 nm. FTIR spectra identify the presence of many active functional groups for the pom

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Fri Feb 14 2020
Journal Name
Progress In Industrial Ecology, An International Journal
3D image reconstruction from its 2D projection - a simulation study
...Show More Authors

A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Hybrid Color Image Compression of Hard & Soft Mixed Thresholding Techniques
...Show More Authors

Publication Date
Sat Feb 01 2020
Journal Name
International Journal Of Computer Science And Mobile Computing
Hierarchical Fixed Prediction of Mixed based for Medical Image Compression.
...Show More Authors

Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Boundary & Geometric Region Features Image Segmentation for Quadtree Partitioning Scheme
...Show More Authors

In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.

Publication Date
Fri Jun 20 2014
Journal Name
Jurnal Teknologi
A Review of Snake Models in Medical MR Image Segmentation
...Show More Authors

Developing an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal

... Show More
Scopus (10)
Scopus
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF