Preferred Language
Articles
/
jhd8EZABVTCNdQwCPINN
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous related works to test the effectiveness of the implemented coding schema.

Crossref
View Publication
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrochemical removal of copper from synthetic wastewater using rotating cylinder electrode
...Show More Authors

The performance of a batch undivided electrochemical reactor with a rotating cylinder electrode of woven-wire (60 mesh size), stainless steel 316, is examined for the removal of copper from synthetic solution of o.5 M sodium chloride containing 125 ppm at pH ≈ 3.5. The effect of total applied current, rotation speed on the figures of merit of the reactor is analyzed. For an applied current of 300 mA at 100 rpm, the copper concentration decreased from 125 to  mg l-1 after 60 min of electrolysis with a specific energy consumption of 1.75 kWh kg-1 and a normalized space velocity of 1.62 h-1. The change in concentration was higher when the total applied currents were increased because of the turbulence

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Iraqi Journal Of Science
New Weighted Synthetic Oversampling Method for Improving Credit Card Fraud Detection
...Show More Authors

The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Comparison between Different Data Image Compression Techniques Applied on SAR Images
...Show More Authors

In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.

View Publication Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Indicative coding of the actor’s performance in the Iraqi theater show
...Show More Authors

View Publication
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of New Theory
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Wed Jan 01 2025
Journal Name
Current Neuropharmacology
Ischemic Stroke and Autophagy: The Roles of Long Non-Coding RNAs
...Show More Authors
:

Ischemic stroke is a significant cause of morbidity and mortality worldwide. Autophagy, a process of intracellular degradation, has been shown to play a crucial role in the pathogenesis of ischemic stroke. Long non-coding RNAs (lncRNAs) have emerged as essential regulators of autophagy in various diseases, including ischemic stroke. Recent studies have identified several lncRNAs that modulate autophagy in ischemic stroke, including MALAT1, MIAT, SNHG12, H19, AC136007. 2, C2dat2, MEG3, KCNQ1OT1, SNHG3, and RMRP. These lncRNAs regulate autophagy by interacting with key proteins involved in the autophagic process, such as Beclin-1, ATG7, and LC3. Understanding the role of lncRNAs in regulating auto

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Spe Asia Pacific Oil & Gas Conference And Exhibition
Effect of nanoparticles on the interfacial tension of CO2-oil system at high pressure and temperature: An experimental approach
...Show More Authors

In the recent decade, injection of nanoparticles (NPs) into underground formation as liquid nanodispersions has been suggested as a smart alternative for conventional methods in tertiary oil recovery projects from mature oil reservoirs. Such reservoirs, however, are strong candidates for carbon geo-sequestration (CGS) projects, and the presence of nanoparticles (NPs) after nanofluid-flooding can add more complexity to carbon geo-storage projects. Despite studies investigating CO2 injection and nanofluid-flooding for EOR projects, no information was reported about the potential synergistic effects of CO2 and NPs on enhanced oil recovery (EOR) and CGS concerning the interfacial tension (γ) of CO2-oil system. This study thus extensively inves

... Show More
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref