Preferred Language
Articles
/
jhfnNY8BVTCNdQwCk2K8
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 19 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect flexibility of the Strategic human resources in improvement operational performance: "Survey study of views of a sample of managers, engineers and technicians in the Baghdad south 2/Station directorate of Electricity"
...Show More Authors

The research attempts to diagnose the level of the effect of human resources flexibility (employees skills flexibility, employees behaviors flexibility, and human resource practice flexibility) in the south al-rusafa directorate of a power  station one of the formations and the Ministry of Electricity, and impact of a range of variables related to the performance operational, namely, (efficiency, effectiveness)recognizing the importance of the subjects studied,& because of the importance of expected results of the field under consideration,researcher selected a sample of size (121) engineers and technicians of workers in the directorate. Was my hypotheses the major search of a relationship and impact between human resources flex

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
College Of Islamic Sciences
Features of visual formation in the poetry of the poets of the Umayyad era
...Show More Authors

Abstract

The Umayyad poets tried to invest all artistic tools in order to achieve a measure of creativity in their texts. The phenomenon of visual composition is breaking the familiar writing system, with the aim of increasing the number of possible connotations. The visual in the Umayyad poetry tries to replace it through expression with the visual image, and its manifestations were manifested by the multiplication of punctuation marks in the body of the poetic text and the tearing of the single poetic line by cutting it into several sentences or repetition.

Keywords: visual formation, poetic writing, Umayyad poetry, recipien

View Publication Preview PDF
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The Muslim Arab Self and the image of the other, religiously and culturally different: a critical analytical study of the causes and forms of political and social intolerance in Iraq
...Show More Authors

This research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Geological Journal
Advanced Geostatistical Techniques for Building 3D Geological Modeling: A Case Study from Cretaceous Reservoir in Bai Hassan Oil Field
...Show More Authors

A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
The impact of new media in social relations: (A field study on a sample of young people in Baghdad)
...Show More Authors

Modern communication and media technology has pioneered new horizons and curried out deep changes in the various fields of social life, It effected enormously human communication as well.
Content one Who late the developments which have effected the social relations ،due to the new media ،especially Face book ,will certainly notice the far cry changes of the social relation net which has been effected ,in a way or another ،the accelerated development ،under the appearance of the so called the virtual society .
Face book has embodied the means – communication ,which has become an important turn point in the social communication .
It is the point the present paper tries to expose an discuss by a field study curried on a sam

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Optical Materials
Impact of a precise pH value change on the characteristics of deposited tin monosulphide films onto a flexible substrate
...Show More Authors

The chemical bath deposition technique (CBD) is considered the cheapest and easiest compared with other deposition techniques. However, it is highly sensitive to effective parameter deposition values such as pH, temperature, and so on. The pH value of the reaction solution has a direct impact on both the nucleation and growth rate of the film. Consequently, this study presents a novel investigation into the effect of a precise change. in the pH reaction solution value on the structural, morphological, and photoresponse characteristics of tin monosulphide (SnS) films. The films were grown on a flexible polyester substrate with pH values of 7.1, 7.4, and 7.7. The X-ray diffraction patterns of the grown films at pH 7.1 and 7.4 confirmed

... Show More
Preview PDF
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (6)
Crossref