Preferred Language
Articles
/
eBfXNY8BVTCNdQwCBmLx
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 29 2025
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
Weaponization of outer space from the perspective of international law
...Show More Authors

View Publication
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
Artistic values of the components of space Natural History Museum
...Show More Authors

The artistic concepts differ in their expressive and semantic relations, among these concepts are the artistic values, as there are points of view, social concepts and historical values interacted from one generation to another over the time. These values represent symbols and indications reflect reality, which has passed through the time to reach us with environmental forms saved by the history at the Natural History Museum, has an impact on the receives mind with its formal and sensory dimensions and connecting with that history as an environment that lacks to the current reality which has immortal means particularly in the cognitive thinking , and the reflection of that in the Iraqi culture and with the associated concepts of interior

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
THE EFFECT OF SPACE VOLUME ON FREE CONVECTION HEAT TRANSFER FOR ONGITUDINAL FINNED CYLINDER WITH DIFFERENT SLOPE NGLES
...Show More Authors

This study deals with free convection heat transfer for the outer surface of two
cylinders of the shape of (Triangular & Rectangular fined cylinders with 8-fins),
putted into two different spaces; small one with dimension of (Length=1.2m,
height=1m, width=0.9m) and large one with dimension of (Length=3.6m, height =3m,
width=2.7m). The experimental work was conducted with air as a heat transport
medium. These cylinders were fixed at different slope angles (0o, 30o, 60o and 90o)
.The heat fluxes were (279, 1012, 1958, 3005, 4419) W/m2, where heat transferred by
convection and radiation. In large space, the results show that the heat transfer from
the triangular finned cylinder is maximum at a slope angle equals

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 29 2017
Journal Name
Journal Of Engineering
Studying the Improvement of the Solubility of Cellulosic Fibers
...Show More Authors

This study focuses for improving the increase the solubility of fiber cellulose in sodium hydroxide solution in concentrations ranging from (4- 12%), from one point of view and from other point of view in (sodium hydroxide and urea) solution concentration (6% NaOH + 4% urea), under  low temperature (- 15, - 20 Co) , depending on the principle of  reducing the degree of polymerization for  fiber cellulose, which is represented in our tests cotton linter who its represent  (Whatman filter paper, Grade 1), some samples subjected to chemical pretreatment as simulation the method of decomposition of cellulosic materials by white or brown fungi that grow on trees, this method involves the use of

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Water Resource And Hydraulic Engineering (jwrhe)
Large Scale Field Physical Model Simulation of Roseires Dam-Break, Sudan
...Show More Authors

Physically based modeling approach has been widely developed in recent years for the simulation of dam failure process due to the lack of field data. This paper provides and describes a physically-based model depending on dimensional analysis and hydraulic simulation methods for estimating the maximum water level and the wave propagation time from breaching of field test dams. The field physical model has been constructed in Dabbah city to represent the collapse of the Roseires dam in Sudan. Five cases of a dam failure were studied to simulate water flood conditions by changing initial water height in the reservoir (0.8, 1.0, 1.2, 1.4 and 1.5 m respectively).The physical model working under five cases, case 5 had the greatest influence of t

... Show More
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Moving Objects Detection Based on Frequency Domain: image processing
...Show More Authors

In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Wed May 15 2019
Journal Name
Tikrit Journal Of Pure Science
Improvement of Alert System against Tampering and Theft in Surveillance Cameras
...Show More Authors

Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic

... Show More
View Publication
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology Journal
The Effect of Re-Use of Lossy JPEG Compression Algorithm on the Quality of Satellite Image
...Show More Authors

In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.

View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jul 29 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref