Preferred Language
Articles
/
ijs-3912
Highly-Performed Fuzzily-logicized Edge Detecting Algorithm for Noisy Handwritings
...Show More Authors

The main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free images.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Panchromatic and Multispectral Image Fusion by Combining IHS Transform and Haar Wavelet
...Show More Authors

The technique of integrate complimentary details from two or more input images is known as image fusion.  The fusion image is more informational and will be complete more than any of the original input images. This paper Illustrates implementation and evaluation of fusion techniques used on the Satellite images a high-resolution Panchromatic (Pan) and Multispectral (MS). A new algorithm is proposed to fuse a  Pan  and MS  of the lowresolution images based on combining IHS and Haar wavelet transform.Firstly, this paper clarifies the classical fusion by using IHS transform and Haar wavelet transform individually. Secondly proposition new strategy of combining the two methods. Performance of the proposed method is evalua

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Predicting Water Depth of Lake Using Remote Sensing image
...Show More Authors

One of the most important of satellite image is studying the surface water
according of its distribution and depth. In this work, three images have been taken
for Baghdad and surrounding for year (1991, 1999 and 2014) and by using of envi
program has been used. Different classes have been evaluated for Al-Habania and
Al-Razaza River according to its depth and water reflectance. In the present work
four types of water depth (very shallow, shallow, moderate, and deep area) have
been detected.

View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Making political image in the election campaigns
...Show More Authors

The study discusses the marketing profile of electoral candidates and politicians especially the image that takes root in the minds of voters has become more important than the ideologies in the technological era or their party affiliations and voters are no longer paying attention to the concepts of a liberal, conservative, right-wing or secular, etc. while their interests have increased towards candidates. The consultants and image experts are able to make a dramatic shift in their electoral roles. They, as specialists in the electoral arena, dominate the roles of political parties.
The importance of the study comes from the fact that the image exceeds its normal framework in our contemporary world to become political and cultural

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Multifocus Images Fusion Based On Homogenity and Edges Measures
...Show More Authors

Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The semiotics of the visual image of women in the discourse of empowerment, Saudi Arabia Kingdom as a model
...Show More Authors

We studied, in this paper, the semiotics of the visual image of women in the discourse of empowerment, through three models of advertising images expressing the particularities of the Saudi Arabian environment.

We aim to know how the mark operates and how it is interpreted, as a semantic process in which the meaning ranges from description to interpretation, and we studied two hypotheses:

-The advertising image is a structure in which the mark corresponds to the reality and the discourse to the context.

-The significance is not found in the visual sign or in the textual sign of the advertising image, but in the creative event that opens up to the social, cultural, and psychological context, and creates a field of dia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Partial Cryptography in Digital Media Environment Based on ECC Algebra
...Show More Authors

In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Automatic Image and Video Tagging Survey
...Show More Authors

     Marking content with descriptive terms that depict the image content is called “tagging,” which is a well-known method to organize content for future navigation, filtering, or searching. Manually tagging video or image content is a time-consuming and expensive process. Accordingly, the tags supplied by humans are often noisy, incomplete, subjective, and inadequate. Automatic Image Tagging can spontaneously assign semantic keywords according to the visual information of images, thereby allowing images to be retrieved, organized, and managed by tag. This paper presents a survey and analysis of the state-of-the-art approaches for the automatic tagging of video and image data. The analysis in this paper covered the publications

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Adaptive inter frame compression using image segmented technique
...Show More Authors

The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.

           Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Fear manufacture in the propaganda discourse image of terrorist ISIS «Daesh» via websites
...Show More Authors

This study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Foreground Object Detection and Separation Based on Region Contrast
...Show More Authors

Foreground object detection is one of the major important tasks in the field of computer vision which attempt to discover important objects in still image or image sequences or locate related targets from the scene. Foreground objects detection is very important for several approaches like object recognition, surveillance, image annotation, and image retrieval, etc. In this work, a proposed method has been presented for detection and separation foreground object from image or video in both of moving and stable targets. Comparisons with general foreground detectors such as background subtraction techniques our approach are able to detect important target for case the target is moving or not and can separate foreground object with high det

... Show More
View Publication Preview PDF
Crossref