Preferred Language
Articles
/
ijp-944
Comparison between Different Data Image Compression Techniques Applied on SAR Images
...Show More Authors

In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 06 2026
Journal Name
Retos: Nuevas Tendencias En Educación Física, Deporte Y Recreación, Issn-e 1988-2041, Issn 1579-1726, Nº. 63, 2025, Págs. 979-989
The effects of the integrative strategy on fostering reflective thinking and imparting basic basketball offensive techniques to female students
...Show More Authors

Autorías: Nadeema Badr Mohammed, Missaa Nadem, Huda Badwe Shbeeb, Iqbal Abdul Hussein Neamah, Najlaa Abbas AL Zuhairi, Nihad Mohammed Alwan. Localización: Retos: nuevas tendencias en educación física, deporte y recreación. Nº. 63, 2025. Artículo de Revista en Dialnet.

View Publication
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 30 2025
Journal Name
Retos
The effects of the integrative strategy on fostering reflective thinking and imparting basic basketball offensive techniques to female students
...Show More Authors

Objective: The objective of this study is to develop instructional materials that teach fundamental basketball skills to female students enrolled in the first year of the College of Physical Education and Sports Sciences for Girls at the University of Baghdad while also encouraging reflective thinking (RT). Research methodology: the researcher chose the experimental methodology with the two equal group's method. Finding the community and choosing the right sample for the study's kind and goals are essential to the accomplishment of any research project. A sample for the primary experiment was picked at random after the researcher confirmed the students' first-year basketball curriculum. This study community consisted of (40) fourth-

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Banking Liberalization and its impact on Attracting Customers: applied research in a sample of Iraqi banks listed on the Iraq Stock Exchange
...Show More Authors

The research aims to shed light on banking liberalization and explain its impact on attracting customers, especially since Iraq adopted this policy after (2003) due to the changes that occurred, as the Central Bank of Iraq granted flexibility to banks in setting the interest rate on deposits and loans as well as allowing the entry of foreign banks in the local environment. The research relied on the analytical method for the dimensions of banking liberalization represented by (liberating interest rates, liberating credit, legal reserve requirements, entering foreign banks, privatization) as well as the factors affecting the attraction of customers, and a number of Iraqi banks listed in the Iraqi Stock Exchange were selected as a

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Numeral Recognition Using Statistical Methods Comparison Study
...Show More Authors

The area of character recognition has received a considerable attention by researchers all over the world during the last three decades. However, this research explores best sets of feature extraction techniques and studies the accuracy of well-known classifiers for Arabic numeral using the Statistical styles in two methods and making comparison study between them. First method Linear Discriminant function that is yield results with accuracy as high as 90% of original grouped cases correctly classified. In the second method, we proposed algorithm, The results show the efficiency of the proposed algorithms, where it is found to achieve recognition accuracy of 92.9% and 91.4%. This is providing efficiency more than the first method.

View Publication Preview PDF
Crossref
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
Electrocautery versus cold steel tonsillectomy comparison study
...Show More Authors

Objective: the objective of this study was to compare the intraoperative blood loss, intraoperative time, postoperative pain and secondary hemorrhage between electrodissection and cold steel dissection tonsillectomy.

Methods: One hundred and six patients were enrolled in this study, the patients were randomly allocated into electrodissection group A (n=51) and cold steel dissection tonsillectomy group B (n=53). All patients are above 7 years and had history of recurrent tonsillitis and/or tonsillar hypertrophy with obstructive symptoms. Intraoperative parameters and postoperative outcome were assessed.

Results: In group A patients had statically significa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Al-mustansiriyah Journal Of Science
A Transfer Learning Approach for Arabic Image Captions
...Show More Authors

Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors

Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Computer Applications
Content-based Image Retrieval (CBIR) using Hybrid Technique
...Show More Authors

Image retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud

... Show More
View Publication
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF