Preferred Language
Articles
/
jih-1056
Studying Hueckel Edge Detector Using Binary Step Edge Image
...Show More Authors

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Measurement of Uranium Concentration in Soil of Middle of Iraq using CR ?V 39 Track Detector
...Show More Authors

The aim of this research is to determine the uranium concentration in soil and water samples taken from different locations from the middle and south of Iraq using fission fragments track registration. Twelve samples of soil and water were taken from middle and South of Iraq. The nuclear reaction used as a source of nuclear fission fragments is U-235 (n.f) obtained by bombardment U-235with thermal neutrons from (Am-Be) neutron source with flux (5X103 n.cm-2.s-1). The concentration values were calculated by a comparison with standard samples recommended by IAEA.The results of the measurements show that the uranium concentration in soil samples were in Thekar (16.38 ppm), AL-Basra (16.1ppm) and (0.78 ppm) in Baghdad, from the results

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Surface Contamination and Dose Rate Verification of Fertilizers common in Iraqi Plantations using RadEye B20 Detector
...Show More Authors

Twenty three samples of granular chemical fertilizers and organic fertilizers commonly utilized in Iraqi ranches were collected. The samples were prepaid and stored in a Marinelli beaker to measure; dose rate, general count rate and surface contamination of the samples using the RadEye B20 detector, firstly with shield, secondly without the shield to estimate the effect of shielding on the measurements. The results showed that using shield made a significant decrease in the radiation measurements reached about 25%. However the mean value of surface contamination, dose rate and general count rate with shield were 0.54Bq/cm2, 0.65µsv/h, and 0.28Cps respectively, and without shield being 0.34Bq/cm2, 1.33µsv/h, and 1.52Cps respectively

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Robust Estimators for Estimate parameters logistic regression model to Binary Response – using simulation)).
...Show More Authors

 

 The logistic regression model of the most important regression models a non-linear which aim getting estimators have a high of efficiency, taking character more advanced in the process of statistical analysis for being a models appropriate form of Binary Data.                                                          

Among the problems that appear as a result of the use of some statistical methods I

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improved Image Compression Technique Using EZW and SPHIT Algorithms
...Show More Authors

 Uncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF
Publication Date
Tue Jun 13 2023
Journal Name
Journal Of Survey In Fisheries Sciences
Spectrum Analyzing X-ray Data Image (FITS) Using Ds9 Program
...Show More Authors

n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Studying the Effects of Contamination on Soil Properties Using Remote Sensing
...Show More Authors

The problem of soil contamination is increased recently due to increasing the industrial wastes such as petroleum hydrocarbon, organic solvents, and heavy metals as well as maximizing the use of agricultural fertilizers. During this period, wide development of data collection methods, using remote sensing techniques in the field of soil and environment applications appear and state the suitable technique for remediation. This study deals with the application of remote sensing techniques in geoenvironmental engineering through a field spectral reflectance measurements at nine spots of naturally hydrocarbons contaminated soil in Al-Daura Refinery Company site which is located to the south west of Baghdad using radiometer device to get stan

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
MR Brain Image Segmentation Using Spatial Fuzzy C- Means Clustering Algorithm
...Show More Authors

conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation. 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 01 2002
Journal Name
Renewable Energy
The optoelectronic properties of CdSe:Cu photoconductive detector
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref