Preferred Language
Articles
/
ijp-303
Lineament automatic extraction analysis for Galal Badra river basin using Landsat 8 satellite image

This research including lineament automated extraction by using PCI Geomatica program, depending on satellite image and lineament analysis by using GIS program. Analysis included density analysis, length density analysis and intersection density analysis. When calculate the slope map for the study area, found the relationship between the slope and lineament density.
The lineament density increases in the regions that have high values for the slope, show that lineament play an important role in the classification process as it isolates the class for the other were observed in Iranian territory, clearly, also show that one of the lineament hit shoulders of Galal Badra dam and the surrounding areas dam. So should take into consideration the lineaments because its plays an important role in the study area.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
EfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficient text in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Review of Automatic Speaker Profiling: Features, Methods, and Challenges

Automatic Speaker Profiling (ASP), is concerned with estimating the physical traits of a person from their voice. These traits include gender, age, ethnicity, and physical parameters. Reliable ASP has a wide range of applications such as mobile shopping, customer service, robotics, forensics, security, and surveillance systems.  Research in ASP has gained interest in the last decade, however, it was focused on different tasks individually, such as age, height, or gender. In this work, a review of existing studies on different tasks of speaker profiling is performed. These tasks include age estimation and classification, gender detection, height, and weight estimation This study aims to provide insight into the work of ASP, available dat

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Automatic Pectoral Muscles Detection and Removal in Mammogram Images
The main aim of the Computer-Aided Detection/Diagnosis system is to assist the radiologists in examining the digital mammograms. Digital mammogram is the most popular screening technique for early detection of breast cancer. One of the problems in breast mammogram analysis is the presence of pectoral muscles region with high intensity in the upper right or left side of most Media-Lateral Oblique views of mammogram images. Therefore, it is important to remove this pectoral muscle from the image for
... Show More
Scopus (4)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Engineering
WATER QUALITY INDICES FOR TIGRIS RIVER IN BAGHDAD CITY

Due to the deterioration of water quality within the last few years because of the increase of water consumption and the waste water production and disposal into the river The water quality in both surface and ground water resources was negatively affected .The concept of water quality index is used as a tool for water quality classification in Tigris River within Baghdad City .Twenty two parameters of pollution were selected to measure the water quality indices of Tigris river within Baghdad city .Those parameters were measured during (2000-2004)as average monthly values ,three water treatment plants were selected out of the eight water treatment plants that exist along the river.Al Kharkh water treatment plant to reflect the water quality

... Show More
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Spectrophotometric Analysis of Vancomycin Hydrochloride in Pure and Pharmaceutical Injections via Batch and Cloud Point Extraction Techniques

Development of a precise and delicate reaction has been acquired for the determination of vancomycin hydrochloride using batch and cloud point extraction (CPE) methods. The first method is based on the formation of azo dye as a result of diazotized dapsone coupled with vancomycin HCl (VAN) in a basic medium. The sensitivity of this reaction was enhanced by utilizing a nonionic surfactant (Triton X-114) and the cloud point extraction technique (second method). The azo dye formed was extracted into the surfactant-rich phase, dissolved in ethanol and detected at λmax 440 nm spectrophotometrically. The reaction was investigated using both batch and CPE methods (with and without extraction), and a simple comparison between the two

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.