Preferred Language
Articles
/
ijp-951
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Feb 10 2016
Journal Name
ألمؤتمر الدولي العلمي الخامس للاحصائيين العرب/ القاهرة
Proposition of Modified Genetic Algorithm to Estimate Additive Model by using Simulation
...Show More Authors

Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo

... Show More
Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Attitudes of Teachers of Art Education towards the Use of Visual Intelligence in Teaching: تحرير جاسم كاطع
...Show More Authors

     The scientific and technological developments and their practical applications in all fields of life in general and in the education field in specific have led to the emergence of variables in the educational structure, teaching methods and in education in their modern form which is consistent in its entirety with    the spirit of the age. We today live the age of knowledge increase full of wide ranging scientific and technological developments. Thus life demands human capabilities of a special kind able to develop and innovate. Here the increasing significance emerges for taking care of the human powers through educational systems much different from those current traditional systems.  System

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
The strategy of visual thinking and its applications in teaching arts (photography model): نورا عبد الله علي
...Show More Authors

The study aims at:
1- Identifying the contemporary educational approaches in teaching arts.
2- The effectiveness of using the visual thinking strategy in photography subject for the first year students in the institute of fine arts/Holy city of Kadhimiyah.
The study sample is made of (30 ) first year students (in the institute of fine arts/in Holy city of Kadhimiyah) distributed into two groups, an experimental group made of (15) students and a control group having the same number of students in order to conduct the test. The test for the visual thinking strategy in the subject of photography has been designed and the validity and reliability for the research tool have been verified. In order to demonstrate the results of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Some properties of bismuth glass solubility visual containing 15% of zinc oxide Mall with concentrated phosphoric acid
...Show More Authors

Conducted the study of the experimental conditions of the interaction of glass the visual Alpmuth containing 15% Mall of zinc with phosphoric acid ????? various degrees of thermal and clip areas prone to interact different way turntable

View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Visual Language as a Reflection of Culture: Violence Against Women in Iraq
...Show More Authors

The present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado

... Show More
View Publication Preview PDF
Crossref