Preferred Language
Articles
/
jeasiq-1638
Split and Merge Regions of Satellite Images using the Non-Hierarchical Algorithm of Cluster Analysis
...Show More Authors

يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهدتها ميادين الحياة المختلفة والتي كثيراً منها طرقت بابها خوارزميات وتقنيات البرمجيات، فهذه الصور تعد ضرورية جداٌ لتمكيننا من دراسة طيف واسع من الاهداف في العديد من الجوانب العلمية، في هذا البحث استخدمت خوارزمية التحليل العنقودي غير الهرمية كطريقة للتقطيع الصوري (شطر ودمج المناطق) بهدف عرض اهمية استخدام الاساليب الاحصائية في مهام المعالجة الصورية مثل التقطيع الصوري، حيث اعتمد على تقنية (K-Means) لتنفيذ هذه المهمة، وقد طبقت خوارزمية هذه التقنية على صورة اقمار صناعية متعددة الاطياف لمشهد غربي العراق، حيث اظهرت النتائج مدى مرونة هذه الخوارزمية في التعامل مع التفاوت في اضاءة العناصر الصورية للصورة الملونة وكفاءة تكوينها لمناطق العناقيد المتكونة من مجاميع من العناصر الصورية المتجانسة في درجة شدة اضاءتها، واخيراً قدرة هذه الخوارزمية على اعطاء صور تتميز بجودتها والتي قيست على وفق مقياس ارتفاع اشارة نسبة الضوضاء (Peak Signal to Noise Ratio (PSNR)) لقياس جودة الصورة.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Iraqi Geological Journal
Facies Analysis and Depositional Stages of The Albian-Aptian Succession in Balad Oil Field, Central Iraq
...Show More Authors

Carbonate-clastic succession which includes the Shu'aiba, Nahr Umr and Mauddud formations are representing a part of the Barremian-Aptian Sequence (Wasi'a Group). The present study includes three boreholes (Ba-1, 4 and 8) within the Balad Oil Field. The study area is located in central Iraq. This field represents a subsurface anticline with a northwest to southeast direction axis within the Mesopotamian Zone. Eight types of microfacies were recognized in the succession of the Mauddud and Shu’aiba formations. These microfacies represent shallow open marine, restricted and semi-restricted, reef - back reef, deep open marine and basinal depositional environments. While Nahr Umr Formation includes two successions, the first is the upp

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Polymeric Membrane Sensors for the Selective Determination of Metoclopramide Hydrochloride and their Applications to Pharmaceutical Analysis
...Show More Authors

Metoclopramide (MCP) ion selective electrodes based on metoclopramide-phosphotungstic acid (MCP-PT) ion pair complex in PVC matrix membrane were constructed. The plasticizers used were tri-butyl phosphate (TBP), di-octyl phenyl phosphonate (DOPP), di-butyl phthalate (DBPH), di-octyl phthalate (DOP), di-butyl phosphate (DBP), bis 2-ethyl hexyl phosphate (BEHP). The sensors based on TBP, DOPP, DBPH and DOP display a fast, stable and linear response with slopes 59.9, 57.7, 57.4, 55.3 mV/decade respectively at pH ranged 2-6. The linear concentration range between 1.0×10-5 – 1.0×10-2 M with detection limit 3.0×10-6 and 4.0×10-6 M for electrodes using TBP, DOPP and DBPH while e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Flow cytometric estimation of low-density neutrophil antibody labeled and non-labeled phagocytosis assay in patients with periodontitis
...Show More Authors

Background: Neutrophils destroy pathogens via phagocytosis. Neutrophils are effective innate and acquired immunity phagocytes. Low-density neutrophils are distinct neutrophil phenotypes linked to several systemic and infectious diseases. To our knowledge, low-density neutrophil phagocytosis in periodontitis has not been examined. Opsonized and non-opsonized fluorescent beads mixed with low-density neutrophils were gated and analyzed by flow cytometry to count cells that consumed at least one bead.

Aims of the Study: To estimate the potential impact of antibody (Ab)-labeled and non-labeled phagocytosis capacity of low-d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
An Optimal Algorithm for Resource Allocation in D2D Communication
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
2013 Ieee International Conference On Systems, Man, And Cybernetics
AWSS: An Algorithm for Measuring Arabic Word Semantic Similarity
...Show More Authors

View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref