Preferred Language
Articles
/
bsj-1301
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
The art Formation and its aesthetic role in the design of digital commercial advertising: سند فؤاد محمد
...Show More Authors

Digital commercial advertising depends on artistic formations to achieve attraction and arousal of attention, which is one of the most important communication factors that the designer seeks to achieve and is considered a key key to recognizing the beauty of the topic and its functional value. Reframe formal vocabulary.
The research included the introduction and includes the research problem and the need for it, which focused on the following question: What is the aesthetic role of artistic formation in the design of commercial advertising?
The aim of the research was: To reveal the aesthetic role of artistic formation in commercial advertising.
It also included the importance of research and research boundaries, as well as def

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Opcion
Analysis of Computer Textbook for the Second Intermediate Grade According to Digital Citizenship
...Show More Authors

The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit

... Show More
Preview PDF
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
Is it Time to Develop Government Communication Functions?
...Show More Authors

Embracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intelle

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
St-Polyform Modules and Related Concepts
...Show More Authors

In this paper, we introduce a new concept named St-polyform modules, and show that the class of St-polyform modules is contained properly in the well-known classes; polyform, strongly essentially quasi-Dedekind and ?-nonsingular modules. Various properties of such modules are obtained. Another characterization of St-polyform module is given. An existence of St-polyform submodules in certain class of modules is considered. The relationships of St-polyform with some related concepts are investigated. Furthermore, we introduce other new classes which are; St-semisimple and ?-non St-singular modules, and we verify that the class of St-polyform modules lies between them.

View Publication Preview PDF
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Iraqi Journal Of Physics
Enhancment of the corrosion resistance of copper metal by laser surface treatment
...Show More Authors

In this work, the copper metal was treated using Nd:YAG laser with energy 1Joul to enhance corrosion resistance and improve surface properties. The copper metal has many applications in industry as well as water, oil and gas pipes. The same conditions, (laser power density, scan speed, distance between paths, medium gas-air) were applied in the laser surface treatment, After laser treatment, the samples microstructures were investigated using optical microscope (OM) to examine micro structural changes due to laser irradiation. Specimen surfaces were investigated using atomic force microscopy (AFM), X-ray diffraction (XRD), macro hardness, and corrosion test before and after laser treatment to

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION: PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION
...Show More Authors

Consumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
Immunological aspects of Alpha 1 Antitrypsin in COVID-19 infection among the Populace and Pregnant Women: Alpha 1 Antitrypsin and COVID-19
...Show More Authors

Since the COVID-19 pandemic alarm was made by the severe acute respiratory syndrome (SARS)-coronavirus (CoV) 2, several institutions and agencies have pursued to clarify the viral virulence and infectivity. The fast propagation of this virus leads to an unprecedented rise in the number of cases worldwide. COVID-19 virus is exceptionally contagious that spreads through droplets, respiratory secretions, and direct contact. The enveloped, single-stranded RNA virus has a specific envelop region called (S) region encoding (S protein) that specifically binds to the host cell receptor. Viral infection requires receptors' participation on the host cell membrane's surface, a  key- step for the viral invasion of susceptible cells.

Rec

... Show More
View Publication Preview PDF
Crossref (1)
Crossref