Preferred Language
Articles
/
ijs-11959
Video Image Compression Using Absolute Moment Block Truncation Method with Orthogonal Search Motion Estimation Technique
...Show More Authors

Image compression has become one of the most important applications of the image processing field because of the rapid growth in computer power. The corresponding growth in the multimedia market, and the advent of the World Wide Web, which makes the internet easily accessible for everyone. Since the early 1980, digital image sequence processing has been an attractive research area because an image sequence, as acollection of images, may provide much compression than a single image frame. The increased computational complexity and memory space required for image sequence processing, has in fact, becoming more attainable. this research absolute Moment Block Truncation compression technique which is depend on adopting the good points of other techniques. As well as algorithm of efficient block's position has been adopted to achieve this research. Also in this paper was introduce A modify of the orthogonal search algorithm (OSA) for searching scheme has been introduced which is contributed in decreasing the motion searching time of the successive inter frames.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Al-manhaj Library
Multivariate Analysis (Second Edition)
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr

... Show More
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
New Study of Mgo Nps in Drilling Fluid to Reduce Stick-Slip Vibration in Drilling System
...Show More Authors

Stick-slip is kind of vibration which associated with drilling operation in around the bottom hole assembly (BHA) due to the small clearance between drill string & the open hole and due to the eccentric rotating of string. This research presents results of specific experimental study that was run by using two types of drilling mud (Fresh water Bentonite & Polymer), with/without Nanoparticle size materials of MgO in various ratios and computes the rheological properties of mud for each concentration [Yield point, plastic viscosity, Av, PH, filter loss (30 min), filter cake, Mud Cake Friction, Friction Factor]. These results then were used to find a clear effects of Nanoparticle drilling mud rheology on stick - slip strength by sev

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Existence and Uniqueness Theorem of Fuzzy Stochastic Ordinary Differential Equations
...Show More Authors

     A fuzzy valued diffusion term, which in a fuzzy stochastic differential equation refers to one-dimensional Brownian motion, is defined by the meaning of the stochastic integral of a fuzzy process. In this paper, the existence and uniqueness theorem of fuzzy stochastic ordinary differential equations, based on the mean square convergence of the mathematical induction approximations to the associated stochastic integral equation, are stated and demonstrated.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Artificial Neural Network Models to Predict the Cost and Time of Wastewater Projects
...Show More Authors

Infrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Stability and Acceleration of Projection Algorithms
...Show More Authors

The focus of this paper is the presentation of a new type of mapping called projection Jungck zn- Suzuki generalized and also defining new algorithms of various types (one-step and two-step algorithms) (projection Jungck-normal N algorithm, projection Jungck-Picard algorithm, projection Jungck-Krasnoselskii algorithm, and projection Jungck-Thianwan algorithm). The convergence of these algorithms has been studied, and it was discovered that they all converge to a fixed point. Furthermore, using the previous three conditions for the lemma, we demonstrated that the difference between any two sequences is zero. These algorithms' stability was demonstrated using projection Jungck Suzuki generalized mapping. In contrast, the rate of convergenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 15 2019
Journal Name
Tikrit Journal Of Pure Science
Improvement of Alert System against Tampering and Theft in Surveillance Cameras
...Show More Authors

Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic

... Show More
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Applying Similarity Measures to Improve Query Expansion
...Show More Authors

The huge evolving in the information technologies, especially in the few last decades, has produced an increase in the volume of data on the World Wide Web, which is still growing significantly. Retrieving the relevant information on the Internet or any data source with a query created by a few words has become a big challenge. To override this, query expansion (QE) has an important function in improving the information retrieval (IR), where the original query of user is recreated to a new query by appending new related terms with the same importance. One of the problems of query expansion is the choosing of suitable terms. This problem leads to another challenge of how to retrieve the important documents with high precision, high recall

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Single-based and Population-based Metaheuristics for Solving NP-hard Problems
...Show More Authors

Metaheuristic is one of the most well-known fields of research used to find optimum solutions for non-deterministic polynomial hard (NP-hard) problems, for which it is difficult to find an optimal solution in a polynomial time. This paper introduces the metaheuristic-based algorithms and their classifications and non-deterministic polynomial hard problems. It also compares the performance of two metaheuristic-based algorithms (Elephant Herding Optimization algorithm and Tabu Search) to solve the Traveling Salesman Problem (TSP), which is one of the most known non-deterministic polynomial hard problems and widely used in the performance evaluations for different metaheuristics-based optimization algorithms. The experimental results of Ele

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref