Preferred Language
Articles
/
ijs-7233
Compression of Astronomical Image Using Five Modulus Method
...Show More Authors

The computer vision branch of the artificial intelligence field is concerned with
developing algorithms for analyzing image content. Data may be compressed by
reducing the redundancy in the original data, but this makes the data have more
errors. In this paper image compression based on a new method that has been
created for image compression which is called Five Modulus Method (FMM). The
new method consists of converting each pixel value in an (4x4, 8×8,16x16) block
into a multiple of 5 for each of the R, G and B arrays. After that, the new values
could be divided by 5 to get new values which are 6-bit length for each pixel and it
is less in storage space than the original value which is 8-bits.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 27 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis and evaluation of B-cyclodextrin Based Nanosponges of 5- Fluorouracil by Using Ultrasound Assisted Method
...Show More Authors

 

CD-nanosponges were prepared by crosslinking B-CD with diphenylcarbonate (DPC) using ultrasound assisted technique. 5-FU was incorporated with NS by freeze drying, and the phase solubility study, complexation efficiency (CE) entrapment efficiency were performed. Also, the particle morphology was studied using SEM and AFM. The in-vitro release of 5-FU from the prepared nanosponges was carried out in 0.1N HCl.

5-FU nanosponges particle size was in the nano size. The optimum formula showed a particle size of (405.46±30) nm, with a polydispersity index (PDI) (0.328±0.002) and a negative zeta potential (-18.75±1.8). Also the drug entrapment efficiency varied with the CD: DPC molar ratio from 15.6 % to 30%. The SEM an

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.   &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Monochrome Image Hologram (MIH)
...Show More Authors

A new computer-generated optical element called a monochrome image hologram (MIH) is described. A real nonnegative function to represent the transmittance of a synthesized hologram is used. This technique uses the positions of the samples in the synthesized hologram to record the phase information of a complex wavefront. Synthesized hologram is displayed on laser printer and is recorded on a film. Finally the reconstruction process is done using computerized .

View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Watermarking in Medical Image
...Show More Authors

Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Exact Solutions for Minimizing cost Function with Five Criteria and Release Dates on Single Machine
...Show More Authors

     In this paper, we present a Branch and Bound (B&B) algorithm of scheduling (n) jobs on a single machine to minimize the sum total completion time, total tardiness, total earliness, number of tardy jobs and total late work with unequal release dates. We proposed six heuristic methods for account upper bound. Also to obtain lower bound (LB) to this problem we modified a (LB) select from literature, with (Moore algorithm and Lawler's algorithm).  And some dominance rules were suggested. Also, two special cases were derived. Computational experience showed the proposed (B&B) algorithm was effective in solving problems with up to (16) jobs, also the upper bounds and the lower bound were effective in restr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Buckling Behavior of Aluminum Alloy Thin-Walled Beam with Holes under Compression Loading
...Show More Authors

Thin-walled members are increasingly used in structural applications, especially in light structures like in constructions and aircraft structures because of their high strength-to-weight ratio. Perforations are often made on these structures for reducing weight and to facilitate the services and maintenance works like in aircraft wing ribs. This type of structures suffers from buckling phenomena due to its dimensions, and this suffering increases with the presence of holes in it. This study investigated experimentally and numerically the buckling behavior of aluminum alloy 6061-O thin-walled lipped channel beam with specific holes subjected to compression load. A nonlinear finite elements analysis was used to obtain the

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Apr 20 2018
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Optimization of Digital Histopathology Image Quality
...Show More Authors

One of the biomedical image problems is the appearance of the bubbles in the slide that could occur when air passes through the slide during the preparation process. These bubbles may complicate the process of analysing the histopathological images. The objective of this study is to remove the bubble noise from the histopathology images, and then predict the tissues that underlie it using the fuzzy controller in cases of remote pathological diagnosis. Fuzzy logic uses the linguistic definition to recognize the relationship between the input and the activity, rather than using difficult numerical equation. Mainly there are five parts, starting with accepting the image, passing through removing the bubbles, and ending with predict the tissues

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
International Journal For Sciences And Technology
Synthesis and anti-bacterial study of novel compounds with bis (four-, five-, and seven-membered) heterocyclic rings
...Show More Authors

New twin compounds having four-, five-, and seven- membered heterocyclic rings were synthesized via Schiff bases (1a,b) which were obtained by the condensation of o-tolidine with two moles of 4- N,N-dimethyl benzaldehyde or 4- chloro benzaldehyde. The reaction of these Schiff bases with two moles of phenyl isothiocyanate, phenyl isocyanate or naphthyl isocyanate as in scheme(1) led to the formation of bis -1,3- diazetidin- 2- thion and bis -1,3- diazetidin -2-one derivatives (2-4 a,b). While in scheme (2) bis imidazolidin-4-one (5a,b) ,bistetrazole (6a,b) and bis thiazolidin-4-one (7a,b) derivatives were produced by reacting the mentioned Schiff bases(1a,b)with two moles of glycine, sodium azide or thioglycolic acid, respectively. The new b

... Show More
Publication Date
Thu Aug 01 2024
Journal Name
Russian Journal Of Bioorganic Chemistry
Synthesis, Characterization of Different Five-Membered Heterocyclic Derivatives, Evaluated Their as Antioxidant, and In Vitro Antimicrobial Agents
...Show More Authors

Objective:This study involved synthesis of a new series of different five-membered heterocyclic derivatives, testing their antioxidant activity, and examining their potential in vitro antimicrobial agents. Methods: The synthesis of the derivatives involved a three-step process. Initially, succinyl chloride was reacted with methanol, followed by a reaction with 80% hydrazine hydrate through a nucleophilic addition-elimination mechanism, resulting in the formation of succinohydrazide (I). This compound was then employed as a precursor for the synthesis of Schiff bases (II), and (III) by reacting it with m-nitro benzaldehyde and p-nitro benzaldehyde. Following this, a ring closure reaction was applied using thioglycolic acid, glycolic acid,

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF