Preferred Language
Articles
/
ijp-733
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Thinking Styles And Its Relationship With The Need for Cognitive for Students of University
...Show More Authors

This study aims to recognize the most common thinking styles and level of the need for cognitive university students , the relation between thinking styles and the need for cognitive, and there are differences according to gender .The sample consists of (250) males and females university students for the academic year (2013-2014), and the researcher uses two scales;" thinking styles scale (Harison &Bramson, 1986), and the need for cognitive scale" (Cacioppo, Petty & Kao , 1996).
The results show that there is difference in the range of the prevalence of the thinking styles among university students , the scientific thinking style is the most common , the students have got the arrange level of the need for cognitive , and there

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simulation Expirment for Proofing the Theoretical Assumption of Time Complexity for Binary Search Tree
...Show More Authors

      It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree).  This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method  to prove th

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Colloid And Interface Science
Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage
...Show More Authors

Hypothesis CO2 geological storage (CGS) involves different mechanisms which can store millions of tonnes of CO2 per year in depleted hydrocarbon reservoirs and deep saline aquifers. But their storage capacity is influenced by the presence of different carboxylic compounds in the reservoir. These molecules strongly affect the water wetness of the rock, which has a dramatic impact on storage capacities and containment security. However, precise understanding of how these carboxylic acids influence the rock’s CO2-wettability is lacking. Experiments We thus systematically analysed these relationships as a function of pressure, temperature, storage depth and organic acid concentrations. A particular focus was on identifying organic acid conce

... Show More
Scopus (108)
Crossref (104)
Scopus Clarivate Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Necessary Condition for Optimal Boundary Control Problems for Triple Elliptic Partial Differential Equations
...Show More Authors

       In this work, we prove that the triple linear partial differential equations (PDEs) of elliptic type (TLEPDEs) with a given classical continuous boundary control vector (CCBCVr) has a unique "state" solution vector (SSV)  by utilizing the Galerkin's method (GME). Also, we prove the existence of a classical continuous boundary optimal control vector (CCBOCVr) ruled by the TLEPDEs. We study the existence solution for the triple adjoint equations (TAJEs) related with the triple state equations (TSEs). The Fréchet derivative (FDe) for the objective function is derived. At the end we prove the necessary "conditions" theorem (NCTh) for optimality for the problem.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Peripheral Perception And its Relation With The Need for Cognition for The University Students
...Show More Authors

The most important topic for psychologist generally is factor of education and it's active tools because learning needs active perception for stimulus that recived by the educator and give it avalue and meaning , Need for cognition is
very important in the various daily fields of life , especially in learning and teaching and the academy work , it help with shifting the learning level for people , and icreas the intense and challenge between them
The research endeavored to achieve the following aim :
1- Measuring the level of peripheral perception for the university student .
2- Measuring the level of need for cognition for the university student .
3- Measuring the level of peripheral perception for the university student

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Schultz and Modified Schultz Polynomials for Edge – Identification Chain and Ring – for Square Graphs
...Show More Authors

In a connected graph , the distance function between each pair of two vertices from a set vertex  is the shortest distance between them and the vertex degree  denoted by  is the number of edges which are incident to the vertex  The Schultz and modified Schultz polynomials of  are have defined as:

 respectively, where the summations are taken over all unordered pairs of distinct vertices in  and  is the distance between  and  in  The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Indoor/Outdoor Deep Learning Based Image Classification for Object Recognition Applications
...Show More Authors

With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 01 2017
Journal Name
International Research Journal Of Engineering And Technology
A POWERFUL AUTOMATED IMAGE INDEXING AND RETRIEVAL TOOL FOR SOCIAL MEDIA Sample
...Show More Authors

The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst

... Show More
Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
Lambert Academic Publishing
Mathematical Models For Contamination Soil
...Show More Authors

ENGLISH