Preferred Language
Articles
/
bsj-1301
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Agbioforum
The Role of the Digital Economy, Business Synergy, and Trade Policies on Global Economic Prosperity in India and China
...Show More Authors

The necessity of addressing global economic prosperity has garnered significant attention from recent studies and policymakers. This article analyses the effects of the digital economy, business synergies, and trade policies on the economic prosperity of China and India. The study examines the impact of political support on the digital economy, business synergies, trade policies, and global economic prosperity in China and India. The study collects data from prominent economists in India and China using questionnaires. The article utilised the SPSS-AMOS software to analyse the relationship between variables. The results showed that the digital economy, business synergies, and trade policies are positively linked to global economic prosperit

... Show More
View Publication
Scopus
Publication Date
Wed May 15 2019
Journal Name
Tikrit Journal Of Pure Science
Improvement of Alert System against Tampering and Theft in Surveillance Cameras
...Show More Authors

Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic

... Show More
View Publication
Publication Date
Mon May 27 2019
Journal Name
Al-academy
Virtual Museums: Features and Characteristics: وعد عدنان محمود
...Show More Authors

This research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Digital Image Visual Communication in Internal Virtual Spaces between the Graphic Design and the Internal Design: وسام حسن هاشم - رغد منذر احمد
...Show More Authors

The digital revolution had greatly affected the methods through which we communicate, starting from the basic concepts of the internet technology and the web content in addition to the important issues that concern the culture of the digital media, the internet governance and the variation in the digital age in general and the graphic and internal design in particular.
This research addresses an important topic that goes along with the scientific development in the field of the digital design, especially in the internal and graphic designs. This study consists of two sections: the first includes the problem of the study and the need for it. Starting from the problem of the research, there is no clear perception of the formal characte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Measuring Positive and Negative Association of Apriori Algorithm with Cosine Correlation Analysis
...Show More Authors

This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Magnetic Deflection Coefficient Investigation for Low Energy Particles
...Show More Authors

In this research we solved numerically Boltzmann transport equation in order to calculate the transport parameters, such as, drift velocity, W, D/? (ratio of diffusion coefficient to the mobility) and momentum transfer collision frequency ?m, for purpose of determination of magnetic drift velocity WM and magnetic deflection coefficient ? for low energy electrons, that moves in the electric field E, crossed with magnetic field B, i.e; E×B, in the nitrogen, Argon, Helium and it's gases mixtures as a function of: E/N (ratio of electric field strength to the number density of gas), E/P300 (ratio of electric field strength to the gas pressure) and D/? which covered a different ranges for E/P300 at temperatures 300°k (Kelvin). The results show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reservoir permeability prediction based artificial intelligence techniques
...Show More Authors

   Predicting permeability is a cornerstone of petroleum reservoir engineering, playing a vital role in optimizing hydrocarbon recovery strategies. This paper explores the application of neural networks to predict permeability in oil reservoirs, underscoring their growing importance in addressing traditional prediction challenges. Conventional techniques often struggle with the complexities of subsurface conditions, making innovative approaches essential. Neural networks, with their ability to uncover complicated patterns within large datasets, emerge as a powerful alternative. The Quanti-Elan model was used in this study to combine several well logs for mineral volumes, porosity and water saturation estimation. This model goes be

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Enhancement CT Scan Image and Study Electronic, Structural and Vibrational Properties of Iobenguane
...Show More Authors

This work is divided into two parts first part study electronic structure and vibration properties of the Iobenguane material that is used in CT scan imaging. Iobenguane, or MIBG, is an aralkylguanidine analog of the adrenergic neurotransmitter norepinephrine and a radiopharmaceutical. It acts as a blocking agent for adrenergic neurons. When radiolabeled, it can be used in nuclear medicinal diagnostic techniques as well as in neuroendocrine antineoplastic treatments. The aim of this work is to provide general information about Iobenguane that can be used to obtain results to diagnose the diseases. The second part study image processing techniques, the CT scan image is transformed to frequency domain using the LWT. Two methods of contrast

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN

... Show More