Preferred Language
Articles
/
jih-1056
Studying Hueckel Edge Detector Using Binary Step Edge Image
...Show More Authors

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Determination the concentration for uranium in phosphrous fertilizers by using nuclear track detector CR-39
...Show More Authors

The aim of this research was to study the concentrations of Uranium in the phosphorus fertilizers using Nuclear track detector (CR-39). Our present investigation is based on the study of 10 types samples for different kinds of phosphorus fertilizers which were available in the local market Some of them were Iraqi made and the others from different countries like, (Iran, Italy, Holland, Lebanon and Jordan) .. The result obtained shows that the Uranium concentration in phosphorus fertilizers samples varies from (3.59ppm) to(2.59ppm). Based on the radioactive concentration of Uranium in the samples all the results obtained between(3.59ppm) in the Iraqi super phosphate to (2.59ppm) in the mixture Iraqi phosphate fertilizer are withi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Technique For Image De-blurring Using Adaptive Wavelet Lagrange Fuzzy Filter
...Show More Authors

A new de-blurring technique was proposed in order to reduced or remove the blur in the images. The proposed filter was designed from the Lagrange interpolation calculation with adjusted by fuzzy rules and supported by wavelet decomposing technique. The proposed Wavelet Lagrange Fuzzy filter gives good results for fully and partially blurring region in images.
 

View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Satellite image classification using proposed singular value decomposition method
...Show More Authors

In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Robust Estimators for Estimate parameters logistic regression model to Binary Response – using simulation)).
...Show More Authors

 

 The logistic regression model of the most important regression models a non-linear which aim getting estimators have a high of efficiency, taking character more advanced in the process of statistical analysis for being a models appropriate form of Binary Data.                                                          

Among the problems that appear as a result of the use of some statistical methods I

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Speech Emotion Recognition Using MELBP Variants of Spectrogram Image
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Measurement of Uranium Concentration in Soil of Middle of Iraq using CR ?V 39 Track Detector
...Show More Authors

The aim of this research is to determine the uranium concentration in soil and water samples taken from different locations from the middle and south of Iraq using fission fragments track registration. Twelve samples of soil and water were taken from middle and South of Iraq. The nuclear reaction used as a source of nuclear fission fragments is U-235 (n.f) obtained by bombardment U-235with thermal neutrons from (Am-Be) neutron source with flux (5X103 n.cm-2.s-1). The concentration values were calculated by a comparison with standard samples recommended by IAEA.The results of the measurements show that the uranium concentration in soil samples were in Thekar (16.38 ppm), AL-Basra (16.1ppm) and (0.78 ppm) in Baghdad, from the results

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Surface Contamination and Dose Rate Verification of Fertilizers common in Iraqi Plantations using RadEye B20 Detector
...Show More Authors

Twenty three samples of granular chemical fertilizers and organic fertilizers commonly utilized in Iraqi ranches were collected. The samples were prepaid and stored in a Marinelli beaker to measure; dose rate, general count rate and surface contamination of the samples using the RadEye B20 detector, firstly with shield, secondly without the shield to estimate the effect of shielding on the measurements. The results showed that using shield made a significant decrease in the radiation measurements reached about 25%. However the mean value of surface contamination, dose rate and general count rate with shield were 0.54Bq/cm2, 0.65µsv/h, and 0.28Cps respectively, and without shield being 0.34Bq/cm2, 1.33µsv/h, and 1.52Cps respectively

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Digital Color Image Watermarking Using Encoded Frequent Mark
...Show More Authors

With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.

This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos

... Show More
View Publication Preview PDF
Crossref (2)
Crossref