Preferred Language
Articles
/
jih-1056
Studying Hueckel Edge Detector Using Binary Step Edge Image

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Study of the matter density distributions of halo nuclei 6He and 16C using the binary cluster model

The harmonic oscillator (HO) and Gaussian (GS) wave functions within the binary cluster model (BCM) have been employ to investigate the ground state neutron, proton and matter densities as well as the elastic form factors of two- neutron 6He and 16C halo nuclei. The long tail is a property that is clearly revealed in the density of the neutrons since it is found in halo orbits. The existence of a long tail in the neutron density distributions of 6He and 16C indicating that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section (𝜎𝑅 ) of these nuclei have been calculated using the Glauber model.

View Publication
Publication Date
Tue Jan 12 2016
Journal Name
Spectral Physics Communications
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
MR Brain Image Segmentation Using Spatial Fuzzy C- Means Clustering Algorithm

conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation. 

Crossref
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Combined DWT and DCT Image Compression Using Sliding RLE Technique

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Studying of Some Mechanical Properties of Reactive Powder Concrete Using Local Materials

This research aims to investigate and evaluate a reactive powder concrete (RPC) cast using economical materials. Its mechanical properties were investigated and evaluated by studying the effects of using different cement and silica fume contents and locally steel fibers aspect ratios as reinforcement for this concrete. A compressive strength of about 155.2MPa, indirect tensile strength of 16.0MPa, modulus of elasticity of 48.7GPa, flexural strength of 43.5MPa, impact energy of 3294.4kN.m and abrasion loss 0.59%  have been achieved for reinforced RPC contains  910 kg/m3 cement content, silica fume content 185 kg/m3 of cement weight and fiber volume fraction 2%. The water absorption values w

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.

Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Crossref (1)
Crossref
Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

Scopus Crossref
View Publication