Preferred Language
Articles
/
ijs-10426
Computer Generation of Low Light-Level Images
...Show More Authors

As result of exposure in low light-level are images with only a small number of
photons. Only the pixels in which arrive the photopulse have an intensity value
different from zero. This paper presents an easy and fast procedure for simulating
low light-level images by taking a standard well illuminated image as a reference.
The images so obtained are composed by a few illuminated pixels on a dark
background. When the number of illuminated pixels is less than 0.01% of the total
pixels number it is difficult to identify the original object.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Recursive Prediction for Lossless Image Compression
...Show More Authors

     This paper introduced an algorithm for lossless image compression to compress natural and medical images. It is based on utilizing various casual fixed predictors of one or two dimension to get rid of the correlation or spatial redundancy embedded between image pixel values then a recursive polynomial model of a linear base is used.

The experimental results of the proposed compression method are promising in terms of preserving the details and the quality of the reconstructed images as well improving the compression ratio as compared with the extracted results of a traditional linear predicting coding system.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Mathematical Model of Effect of Number of Pulses of Pulsed Laser on Formation Process of Plasma
...Show More Authors

The effect of number of pulses of pulsed laser on materials is studied analytically, different pulses has been used with the same delay time.  The depth of possible damage to the surface of copper and titanium as well as depth of the crater to both materials were considered in this study.  The study revealed that linear model is only possible when estimating depth of possible damage for copper material, this means that the depth of possible damage increases with the increment of number of laser pulses .As for titanium material, it is found  the relationship is nonlinear.  The depth of possible damage of titanium and copper is not the same, and copper seems to be more predictable than titanium.  
 

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Agricultural And Statistical Sciences
ON ERROR DISTRIBUTION WITH SINGLE INDEX MODEL
...Show More Authors

In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.

Scopus
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Local Dependence for Bivariate Weibull Distributions Created by Archimedean Copula
...Show More Authors

In multivariate survival analysis, estimating the multivariate distribution functions and then measuring the association between survival times are of great interest. Copula functions, such as Archimedean Copulas, are commonly used to estimate the unknown bivariate distributions based on known marginal functions. In this paper the feasibility of using the idea of local dependence to identify the most efficient copula model, which is used to construct a bivariate Weibull distribution for bivariate Survival times, among some Archimedean copulas is explored. Furthermore, to evaluate the efficiency of the proposed procedure, a simulation study is implemented. It is shown that this approach is useful for practical situations and applicable fo

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
...Show More Authors

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Prediction of Coefficient of Permeability of Unsaturated Soil
...Show More Authors

A simple technique is proposed in this paper for estimating the coefficient of permeability of an unsaturated soil based on physical properties of soils that include grain size analysis, degree of saturation or water content, and porosity of the soil. The proposed method requires the soil-water characteristic curve for the prediction of the coefficient of permeability as most of the conventional methods. A procedure is proposed to define the hydraulic conductivity function from the soil water characteristic curve which is measured by the filter paper method. Fitting methods are applied through the program (SoilVision), after indentifying the basic properties of the soil such as Attereberg limits, specific gravity, void ratio, porosity, d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
Measurement of Appreciation of Clothes of University’s Students
...Show More Authors

Clothes are considered a means of aesthetic and artistic expression that help to hide the flaws of the body and highlight its merits , it has importance in people's lives as it reflects the individual's idea of himself and his personality. Whereas  the appreciation  in clothing  is a reflection of a person's sense of artistic components and the application of this sense to the clothes of his choice. Regarding the differences in clothing tastes by the university students according to the following variables (gender, specialization, stage of study,  age, monthly income), the current research is considered quantitative descriptive research that is concerned with studying a phenomenon that exists in reality, measuring it

... Show More
View Publication Preview PDF