In this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.
In the name of of Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin, and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa a gramophone study. As mentioned in the study of the morphological subj
The In this experimental study, natural stone powder was utilized to improve a cohesive soil’s compaction and strength properties. According to the significant availability of limestone in the globe, it has been chosen for the purpose of the study, in addition to considering the existing rock industry massive waste. Stone powder was used in percentages of 4, 8, 12, 16% replaced from the soil weight in dry state. Some of cohesive soil’s consistency, shear, and compaction properties were depicted after improvement. The outcomes yielded in significant amendments in the experimented geotechnical properties after stone powder addition considering 60 days curing period. Cohesion and friction angle were notably increased by
... Show MoreThe research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel
... Show MoreThe mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore, the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of the mobile network and its wide usage through different types of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat
... Show More