Preferred Language
Articles
/
ijs-3751
Fast Fractal Technique using Modified Moment Features on Domain Blocks
...Show More Authors

In this research, a new technique is suggested to reduce the long time required by the encoding process by using modified moment features on domain blocks. The modified moment features were used in accelerating the matching step of the Iterated Function System (IFS). The main disadvantage facing the fractal image compression (FIC) method is the over-long encoding time needed for checking all domain blocks and choosing the least error to get the best matched domain for each block of ranges. In this paper, we develop a method that can reduce the encoding time of FIC by reducing the size of the domain pool based on the moment features of domain blocks, followed by a comparison with threshold (the selected  threshold based on experience is 0.0001). The experiment was conducted on three images with size of 512x512 pixel, resolution of 8 bits/pixel, and different block size (4x4, 8x8 and, 16x16 pixels). The resulted encoding time (ET) values achieved by the proposed method were 41.53, 39.06, and  38.16 sec, respectively, for boat , butterfly, and house images of block size 4x4 pixel.  These values were compared with those obtained by the traditional algorithm for the same images with the same block size, which were 1073.85, 1102.66, and 1084.92 sec, respectively. The results imply that the proposed algorithm could remarkably reduce the ET of the images in comparison with the traditional algorithm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Engineering, Technology & Applied Science Research
Investigating the Ability of producing Sustainable Blocks using Recycled Waste
...Show More Authors

The primary objective of this study is to manage price market items in the construction of walls for affordable structures with load-bearing hollow masonry units using the ACI 211.1 blend design with a slump range of 25-50 mm that follows the specification limits of IQS 1077. It was difficult to reach a suitable cement weight to minimum content (economic and environmental goal), so many trail mixtures were cast. A portion (10-20%) of the coarse aggregates was replaced with concrete, tile, and clay-brick waste. Finally, two curing methods were used: immersion under water as normal curing, and water spraying as it is closer to the field conditions. The recommendation in IQS 1077 to increase the curing period from 14 to 28 days was tak

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Astronomi cal Color Image Compression Using Multilevel Block Truncation Coding –Modified Vector Quantization Technique
...Show More Authors

A common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
White Blood Cells Nuclei Localization Using Modified K-means Clustering Algorithm and Seed Filling Technique
...Show More Authors

The presence of White Blood Cells (WBCs) in the body of human has a great role in the protection of the body against many pathogens. The recognition of the WBC is the first important step to diagnose some particular diseases. The pathologists usually use an optical microscope to recognize WBCs, but, this process is a quite tedious, time-consuming, error prone, very slow, and expensive. In addition, it needs experts with long practice in this field. For these reasons, a computer assisted diagnostic system that helps pathologists in the process of diagnosis can be effective, easy and safe. This research is devoted to develop a system based on digital image processing methods to localize WBCs nuclei. The proposed system involved a collectio

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Spot Size on the Fractal Optical Modulation
...Show More Authors

The present paper analyzes the signal emitting from the Reticle during changing the spot size of laser falling on the disk and shows the optimum frequency and the amount of energy window in different patterns of modulator (Reticle).  All results are obtained by establishing   a special program named “Disk optical modulator version 3" using the language visual basic 6 ahich contains many parameters. All models of optical modulator consist of twenty sectors, ten sectors are opaque and other ten sectors are transmitted for the laser. The number of sectors depends on several factors as chopping frequency, power transparent and modulation transfer function.   It has been demonstrated by simulations, the optimal

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Satellite Images Classification in Rural Areas Based on Fractal Dimension
...Show More Authors

Fractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity crit

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Choosing Between Trimmed L-moment and L-moment Estimators of Extreme Value Distribution (Type- I)
...Show More Authors

Trimmed Linear moments (TL-moments) are natural generalization of L-moments that do not require the mean of the underlying distribution to exist. It is known that the sample TL-moments is unbiased estimators to corresponding population TL-moment. Since different choices for the amount of trimming give different values of the estimators it is important to choose the estimator that has minimum mean squares error than others. Therefore, we derive an optimal choice for the amount of trimming from known distributions based on the minimum errors between the estimators. Moreover, we study simulation-based approach to choose an optimal amount of trimming and maximum like hood method by computing the estimators and mean squares error for range of

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 17 2019
Journal Name
Lecture Notes In Electrical Engineering
Aspect Categorization Using Domain-Trained Word Embedding and Topic Modelling
...Show More Authors

Aspect-based sentiment analysis is the most important research topic conducted to extract and categorize aspect-terms from online reviews. Recent efforts have shown that topic modelling is vigorously used for this task. In this paper, we integrated word embedding into collapsed Gibbs sampling in Latent Dirichlet Allocation (LDA). Specifically, the conditional distribution in the topic model is improved using the word embedding model that was trained against (customer review) training dataset. Semantic similarity (cosine measure) was leveraged to distribute the aspect-terms to their related aspect-category cognitively. The experiment was conducted to extract and categorize the aspect terms from SemEval 2014 dataset.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref