Preferred Language
Articles
/
cxYkZ4oBVTCNdQwCEZ30
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique which has the highest values of energy (En) and compression ratio (CR) and least values of bit per pixel (bpp), time (T) and rate distortion (R (D)). Also the values of the compression parameters of the color image are nearly the same as the average values of the compression parameters of the three bands of the same image.

Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Smoothing Image using Adaptive Median Filter
...Show More Authors

Median filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Analysis on the Applicability of Meta-Heuristic Searching Techniques for Automated Test Data Generation in Automatic Programming Assessment
...Show More Authors

Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Influence of Cold Plasma on Sesame Paste and the Nano Sesame Paste Based on Co-occurrence Matrix
...Show More Authors

The aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed.  The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
Automated Glaucoma Detection Techniques: A Literature Review
...Show More Authors

Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 22 2006
Journal Name
Journal Of Physical Education
The Percentage Of Success And Failure Of Some Compound Offense Skills In Basketball For Joiners
...Show More Authors

The aim of the research is to identify the percentage of success and failure of some compound offensive skills in joiner basketball. It was evident that development only occurred though the mastery of the basic single offence skills as well as the ability to perform compound skills accurately and consistently. Not paying enough attention to compound skills leads evidentially to weakness in the athlete's level that in turn leads to mistakes in performance. Six joiner games of the best four teams in Baghdad were filmed and analyzed. The results of analyzing the compound offence skills were as follows:  There was some weakness in the athletes' ability in using compound offence skills specially receiving, dribbling and following through that

... Show More
Preview PDF
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Instructional Program Concerning Non-Pharmacological Guideline on Controlling Essential Hypertension among Patients at AL-Sader Hospital in AL-Najaf AL-Ashraf City
...Show More Authors

Objective: The aims of present study to detect the effectiveness of instruction program of non-pharmacological guideline on blood pressure and laboratory test.

 

Methodology: A pre-experimental study was conducted in Al-Sader Teaching Hospital   from 8th of September 2019 to 25th of May 2020, in order to find out the effectiveness of instruction program concerning non-pharmacological guideline on controlling essential hypertension among patients. A non- probability (purposive sample) of 50 patients with essential hypertension is selected. Those patients are already diagnosed with Essential Hypertension

... Show More
View Publication Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Serviceability Performance of Externally Prestressed Steel-Concrete Composite Girders
...Show More Authors

The behavior of externally prestressed composite beams under short term loading has been studied. A computer program developed originally by Oukaili to evaluate curvature is modified to evaluate the deflection of prestressed composite beam under flexural load. The analysis model based on the deformation compatibility of entire structure that allows to determine the full history of strain and stress distribution along cross section depth, deflection and stress increment in the external tendons .
The evaluation of curvatures for the composite beam involves iterations for computing the strains vectors at each node at any loading stage. The stress increment determined using equations depended on the member deflection at points of connecti

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 16 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Watermarking in Medical Image
...Show More Authors

Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Monochrome Image Hologram (MIH)
...Show More Authors

A new computer-generated optical element called a monochrome image hologram (MIH) is described. A real nonnegative function to represent the transmittance of a synthesized hologram is used. This technique uses the positions of the samples in the synthesized hologram to record the phase information of a complex wavefront. Synthesized hologram is displayed on laser printer and is recorded on a film. Finally the reconstruction process is done using computerized .

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref