Preferred Language
Articles
/
jcoeduw-922
Hybrid Transform Based Denoising with Block Thresholding
...Show More Authors

A frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm competes favorably with SWT, and SLT based algorithms, and obtain up to 1.23 dB PSNR improvement.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Materials Research Express
Spray pyrolysis of graphene oxide based composite for optical and wettability applications
...Show More Authors
Abstract<p>In this study, silica-graphene oxide nano–composites were prepared by sol-gel technique and deposited by spray pyrolysis method on glass substrate. The effect of changing the graphene/silica ratio on the optical properties and wetting of these nano–structures has been investigated. The structural and morphological properties of the thin films have been studied by x-ray diffraction spectroscopy (XRD), field emission scanning electron microscope (FESEM), energy dispersive x-ray spectroscopy (EDS) and atomic force microscope (AFM). XRD results show that silica structures present in the synthesized films exhibit amorphous character and there is a poor arrangement in graphene plates al</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Dual Stages of Speech Enhancement Algorithm Based on Super Gaussian Speech Models
...Show More Authors

Various speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Estimation of Minimum Miscibility Pressure for 〖CO〗_2 Flood Based on EOS
...Show More Authors

CO2 Gas is considered one of the unfavorable gases and it causes great air pollution. It’s possible to decrease this pollution by injecting  gas in the oil reservoirs to provide a good miscibility and to increase the oil recovery factor. MMP was estimated by Peng Robinson equation of state (PR-EOS). South Rumila-63 (SULIAY) is involved for which the miscible displacement by  is achievable based on the standard criteria for success EOR processes. A PVT report was available for the reservoir under study. It contains deferential liberation (DL) and constant composition expansion (CCE) tests.  PVTi software is one of the (Eclipse V.2010) software’s packages, it has been used to achieve the goal.  Many trials have been done to ma

... Show More
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Very High Q-Factor Based On G-Shaped Resonator Type Metamaterial Absorber
...Show More Authors

High Q-factor based on absorption can be achieved by tuning (the reflection and the transition percentage). In this work, the simple design and simulated in S-band have been investigated. The simulation results of G-shape resonator are shown triple band of absorption peaks 60%, 91.5%, and 70.3%) at resonance frequency 2.7 GHz, 3.26 GHz, and 4.05 GHz respectively. The results exhibited very high of the Q-factor ( 271 ) at resonance frequency ( 3.26 GHz ).  The high Q-factor can be used to enhance the sensor sensing, narrowband band filter and  image sensing.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sat Oct 23 2021
Journal Name
Iraqi Journal Of Physics
Thin Film Dye Laser Based on BBQ Doped Poly (Methyl Meth-Acrylate)
...Show More Authors

This paper reports on the laser emission properties of the BBQ dye in poly (methyl meth-acrylate)(PMMA). This host material combines the advantages of an organic environment for dye with the thermoptical mechanical properties of an organic dye. A BBQ dye solid solution in PMMA polymer. A nitrogen laser in untuned laser cavity has pumped thin films. We developed the concentration and the thickness to get high efficiency. The laser efficiency had been increased from 7% at thickness 1.5 m to 16.5% at thickness 3.5m, and from 1% to 10% when concentration increased from 1x10-5M to 1x10-3 M

View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref (1)
Crossref