Preferred Language
Articles
/
jcoeduw-887
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among other wavelet functions. The system was implemented using
MATLAB R2010a. The average improvement in term of PSNR between Haar and other
wavelet functions is 1.37dB

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Engineering
Comparative Study between Nanofiltration and Reverse Osmosis Membranes for the Removal of Heavy Metals from Electroplating Wastewater
...Show More Authors

The present work aimed to study the efficiency of nanofiltration (NF) and reverse osmosis (RO) process for water recovery from electroplating wastewater and study the factors affecting the performance of two membrane processes. Nanofiltration and reverse osmosis membranes are made from polyamide as spiral wound module. The inorganic materials ZnCl2, CuCl2.2H2O, NiCl2.6H2O and CrCl3.6H2O were used as feed solutions. The operating parameters studied were: operating time, feed concentrations for heavy metal ions, operating pressure, feed flow rate, feed temperature and feed pH. The experimental results showed, the permeate concentration increased and water flux decreased with increase in time from 0 to 70 min. The permeate concentrations incre

... Show More
Preview PDF
Publication Date
Fri Aug 12 2016
Journal Name
Iraqi Dental Journal
Pacifier Sucking Habit and its Relation to Oral Health of Children Aged 1-5 Years (comparative study)
...Show More Authors

View Publication
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A comparative study of Gaussian mixture algorithm and K-means algorithm for efficient energy clustering in MWSN
...Show More Authors

Wireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Nov 22 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparative Study of Thymidine Kinase -1 and Total Antioxidant Capacity in Iraqi Children with Platelet Count Disorder
...Show More Authors

        This study aimed to find relationship between thymidine kinase-1 (TK-1) as tumor marker and total antioxidant capacity (TAC) in Iraqi children patients with thrombocytopenia and with thrombocytosis. The present study conducted 60 children patients (30 patients with idiopathic thrombocytopenia purpura (ITP) and 30 patients with thrombocytosis caused by leukemia) attending the Children Fever Hospital in the Medical City / Baghdad, and 30 healthy children as a control group. All study groups were with range ages (1-15) years, and they were diagnosed by assay of platelet count, Prothrombin Time   (PT), and partial Thromboplastin Time (PTT). The results shown elevation  in plasma TK-1

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci
Comparative Study of Thymidine Kinase -1 and Total Antioxidant Capacity in Iraqi Children with Platelet Count Disorder
...Show More Authors

This study aimed to find relationship between thymidine kinase-1 (TK-1) as tumor marker and total antioxidant capacity (TAC) in Iraqi children patients with thrombocytopenia and with thrombocytosis. The present study conducted 60 children patients (30 patients with idiopathic thrombocytopenia purpura (ITP) and 30 patients with thrombocytosis caused by leukemia) attending the Children Fever Hospital in the Medical City / Baghdad, and 30 healthy children as a control group. All study groups were with range ages (1-15) years, and they were diagnosed by assay of platelet count, Prothrombin Time (PT), and partial Thromboplastin Time (PTT). The results shown elevation in plasma TK-1 and TAC values in children patients with thrombocytopenia and w

... Show More
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of The Mental image Building Dimensions for The Company to Aattract Attention of Iraqi Consumers for local Products: Exploratory Study
...Show More Authors

The survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research

... Show More
View Publication Preview PDF
Crossref