Preferred Language
Articles
/
ijp-361
Adaptive inter frame compression using image segmented technique
...Show More Authors

The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.

           Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit, the research modifies a method for video image data compression based on the two-component code; in this coding technique, the video image is partitioned into regions of slowly varying intensity. The contours separating the regions are coded by DCT, while the rest image regions are coded by Block-Truncation Coding. this hybrid coding technique called segmented image coding (SIC). Also in this paper A modify of the four step search for motion Estimation technique was produce. for searching scheme has been introduced which is contributed in decreasing  the motion estimation  searching time of the successive inter frames.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 25 2022
Journal Name
2022 Ieee 20th International Conference On Industrial Informatics (indin)
Robust Continuous Sliding Mode Controller for Uncertain Canonical Brunovsky Systems Using Reduced Order Extended State Observer
...Show More Authors

A reduced-order extended state observer (RESO) based a continuous sliding mode control (SMC) is proposed in this paper for the tracking problem of high order Brunovsky systems with the existence of external perturbations and system uncertainties. For this purpose, a composite control is constituted by two consecutive steps. First, the reduced-order ESO (RESO) technique is designed to estimate unknown system states and total disturbance without estimating an available state. Second, the continuous SMC law is designed based on the estimations supplied by the RESO estimator in order to govern the nominal system part. More importantly, the robustness performance is well achieved by compensating not only the lumped disturbance, but also its esti

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Prediction of pore and fracture pressure using well logs in Mishrif reservoir in an Iraqi oilfield
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers And Electronics In Agriculture
Detection of charcoal rot (Macrophomina phaseolina) toxin effects in soybean (Glycine max) seedlings using hyperspectral spectroscopy
...Show More Authors

View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Water Process Engineering
Immobilization of cobalt ions using hierarchically porous 4A zeolite-based carbon composites: Ion-exchange and solidification
...Show More Authors

View Publication
Scopus (55)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Differentiation of Adipose-Derived Mesenchymal Stem Cells into Neuron-Like Cells induced by using β-mercaptoethanol
...Show More Authors

Background: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Tue Aug 13 2024
Journal Name
Brazilian Dental Science
Poly ether keton keton polymer deposition on laser surface structured commercial pure titanium using magnetron sputtering
...Show More Authors

Objective: This study aimed to evaluate the effect of coating titanium (Ti) dental implant with polyether ketone ketone (PEKK) polymer using magnetron sputtering on osseointegration, trying to overcome some of the problems associated with Ti alloys. Material and Methods: Implants were prepared from grade (II) commercially pure titanium (CP Ti), then laser was used to induce roughness on the surface of Ti. PEKK was deposited on the surface of Ti implants by radiofrequency (RF) magnetron sputtering technique. The implants were divided in to three groups: without coating (Ls), with PEKK coating using argon (Ar) as sputtering gas (Ls-PEKK-Ar), and with PEKK coating using nitrogen (N) as sputtering gas (Ls-PEKK-N). All the implants were implante

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Nov 16 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Importance of Using Metaverse Technology in Education from the Point of View of University Teachers
...Show More Authors

The study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Engineering
Influence of Using Various Percentages of Slag on Mechanical Properties of Fly Ash-based Geopolymer Concrete
...Show More Authors

In order to implement the concept of sustainability in the field of construction, it is necessary to find an alternative to the materials that cause pollution by manufacturing, the most important of which is cement. Because factory wastes provide siliceous and aluminous materials and contain calcium such as fly ash and slag that are used in the production of high-strength geopolymer concrete with specifications similar to ordinary concrete, it was necessary for developing this type of concrete that is helping to reduce CO2 (dioxide carbon) in the atmosphere. Therefore, the aim of this study was to study the influence of incorporating various percentages of slag as a replacement for fly ash and the effect of sl

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
South African Journal Of Chemical Engineering
Removal of COD from petroleum refinery wastewater by adsorption using activated carbon derived from avocado plant
...Show More Authors

View Publication
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref