Preferred Language
Articles
/
jeasiq-1345
Use some statistical algorithms in mock hacking satellite image
...Show More Authors

In the recent years, remote sensing applications have a great interest because it's offers many advantages, benefits and possibilities for the applications that using this concept, satellite it's one must important applications for remote sensing, it's provide us with multispectral images allow as study many problems like changing in ecological cover or biodiversity for earth surfers, and illustrated biological diversity of the studied areas by the presentation of the different areas of the scene taken depending on the length of the characteristic wave, Thresholding it's a common used operation for image segmentation, it's seek to extract a monochrome image from gray image by segment this image to two region (foreground & background) depending on pixels intensity to reducing image distortion, and also separated the target area from the rest of scene features under study, so we seek to used number of  thresholding techniques in this paper for clarify the importance of this concept in image processing and we proposed a new statistical thresholding techniques which compared with techniques used, and the result showed the advantage of proposed techniques that achieved from applying the techniques on multispectral satellite image takin for an area west of Iraq that characterized their environmental diversity so it's a good case to study.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (11)
Scopus Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Educational And Psychological Researches
أثر استعمال الوسائل التعليمية للكتاب المدرسي ورسومات المعلم التوضيحية في تحصيل المعلومات التاريخية واستبقائها
...Show More Authors

The research aims to determine the impact of the use of teaching aids for the textbook and graphics teacher illustrations in the collection of historical information and retention, limited research on a sample of students in grade five numbered (68) primary school students of Benin in Baghdad governorate / Breeding Rusafa First, select the researchers of scientific material for students in research Topics are the first and second chapter of the Book of the Arab-Islamic history, set by the Ministry of Education.

 And promising targets behavioral and according to the content of subject numbered (100) goal and lesson plans exemplary nu

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 05 2015
Journal Name
مجلة كلية مدينة العلم الجامعة
استعمال البرمجة الخطٌة لحل مشكلة النقل واختبار امثلية الحل بالطريقة المعدلة
...Show More Authors

تناول البحث حل مشكلة النقل باستخدام مدخل بحوث العملٌات فً مرحلة التحلٌل والتصمٌم لنموذج المشكلة , وتم مقارنة النتائج التً حصلنا علٌها من الحلول لصٌاؼة التحلٌل وبرهنة صحة النموذج المتجه صوب الموضوع, وتم اجراء المقارنة بٌن الحلول المختلفة الختٌار اقل قٌمة لدالة الهدؾ لكً ٌتمكن المستفٌد من صنع القرار, باستخدام الطرق االربعة )طرٌقة الزاوٌة الشمالٌة الؽربٌة, طرٌقة اقل التكالٌؾ, طرٌقة فوجل التقرٌبٌة, الطرٌقة ال

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using modern techniques for determining the location of marketing outlet for product of the state company for vegetables oil
...Show More Authors

Were arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution  to chose the suggested market  to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Using of Coating Technique by Inorganic Flame Retardants to Protect Civil and Industrial Foundations from Fires
...Show More Authors

   In the present research the flame retardancy to  buildings and industrial foundations which are manufacturing from advanced polymeric  composite material was increased by coating it with surface layer included flame retardant material.  A(3mm) thick antimony tetroxide was used as a coated layer to retard and prevent the flame spread to the coating surface of polyester resin (SIROPOL 8340-PI) reinforced with hybrid fibers as a woven roving (°45-°0) consist of carbon and kevlar (49) fibers, and exposed it to direct flame generated from gas torch at temperature of (2000ºC), at  different exposed distance (10,15,20mm)and study the rang of resistance for this layer and its ability to protec

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 27 2020
Journal Name
Journal Of Physics: Conference Series
Investigation of the State Vectors and Prediction of the Orbital Elements for Spot-6 Satellite during 1300 periods with Perturbations
...Show More Authors
Abstract<p>Computer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4<sup>th</sup> order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of Internal Medicine
On the use of substandard medicines in hematology: An emerging concern in the Middle East and North Africa region
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref