Preferred Language
Articles
/
alkej-620
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet denoising stage . The choice of the threshold estimation is carried out by analyzing the statistical parameters of the wavelet sub band coefficients like standard deviation, arithmetic mean and geometrical mean . The noisy image is first decomposed into many levels to obtain different frequency bands. Then soft thresholding method is used to remove the noisy coefficients, by fixing the optimum thresholding value by this method .

Experimental results on test image by using this method show that this method yields significantly superior image quality and better Peak Signal to Noise Ratio (PSNR). Here, to prove the efficiency of this method in image restoration , we have compared this with various restoration  methods like Wiener filter alone and inverse filter.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Plant Archives
Schistosomiasis vector control using cucumis melo plantextractswithbioassayexperiment
...Show More Authors

he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail

... Show More
View Publication
Scopus
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Object Filling Using Table Based Boundary Tracking
...Show More Authors

The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
2018 1st Annual International Conference On Information And Sciences (aicis)
Speech Emotion Recognition Using Minimum Extracted Features
...Show More Authors

Recognizing speech emotions is an important subject in pattern recognition. This work is about studying the effect of extracting the minimum possible number of features on the speech emotion recognition (SER) system. In this paper, three experiments performed to reach the best way that gives good accuracy. The first one extracting only three features: zero crossing rate (ZCR), mean, and standard deviation (SD) from emotional speech samples, the second one extracting only the first 12 Mel frequency cepstral coefficient (MFCC) features, and the last experiment applying feature fusion between the mentioned features. In all experiments, the features are classified using five types of classification techniques, which are the Random Forest (RF),

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Diagnosis of Diabetes Using Artificial Intelligence Programs
...Show More Authors

Scientific development has occupied a prominent place in the field of diagnosis, far from traditional procedures. Scientific progress and the development of cities have imposed diseases that have spread due to this development, perhaps the most prominent of which is diabetes for accurate diagnosis without examining blood samples and using image analysis by comparing two images of the affected person for no less than a period. Less than ten years ago they used artificial intelligence programs to analyze and prove the validity of this study by collecting samples of infected people and healthy people using one of the Python program libraries, which is (Open-CV) specialized in measuring changes to the human face, through which we can infer the

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Engineering
REMOVAL OF HEAVY METALS USING REVERSE OSMOSIS
...Show More Authors

The aim of this work is to study reverse osmosis characteristics for copper sulfate hexahydrate (CuSO4.6H2O), nickel sulfate hexahydrate (NiSO4.6H2O) and zinc sulfate hexahydrate (ZnSO4.6H2O) removal from aqueous solution which discharge from some Iraqi factories such as Alnasser Company for mechanical industries. The mode of operation of reverse osmosis was permeate is removed and the concentrate of metals solution is recycled back to the feed vessel. Spiral-wound membrane is thin film composite membrane (TFC) was used to conduct this study on reverse osmosis. The variables studied are metals concentrations (50 – 150 ppm) and time (15 – 90 min). It was found that increasing the time results in an increase in concentration of metal in p

... Show More
Publication Date
Tue Sep 01 2009
Journal Name
Al-nahrain Journal Of Science
Colorimetric assay of aspirin using modified method
...Show More Authors

In this research, we did this qualitative and quantitative study in order to improve the assay of aspirin colorimetrically using visible spectrophotometer. This method depends on aqueous hydrolysis of aspirin and then treating it with the ferric chloride acidic solution to give violet colored complex with salicylic acid, as a result of aspirin hydrolysis, which has a maximum absorption at 530nm. This procedure was applied to determine the purity of aspirin powder and tablet. The results were approximately comparative so that the linearity was observed in the high value of both correlation coefficient (R= 0.998) and Determination Coefficient or Linearity (R2= 0.996) while the molar absorpitivity was 1.3× 103 mole

Publication Date
Wed May 01 2019
Journal Name
Materials Science And Engineering
Analysis of Wind Turbine Using QBlade Software
...Show More Authors

Crossref (45)
Crossref