Preferred Language
Articles
/
jih-1074
Artificial Neural Network for TIFF Image Compression
...Show More Authors

The main aim of image compression is to reduce the its size to be able for transforming and storage, therefore many methods appeared to compress the image, one of these methods is "Multilayer Perceptron ". Multilayer Perceptron (MLP) method which is artificial neural network based on the Back-Propagation algorithm for compressing the image. In case this algorithm depends upon the number of neurons in the hidden layer only the above mentioned will not be quite enough to reach the desired results, then we have to take into consideration the standards which the compression process depend on to get the best results. We have trained a group of TIFF images with the size of (256*256)  in our research, compressed them by using MLP for each compression process the number of neurons in the hidden layer was changing and calculating the compression ratio, mean square error and peak signal-to-noise ratio to compare the results to get the value of  original image. The findings of the research was the desired results as the compression ratio was less than five and a few mean square error thus a large value of peak signal-to-noise ratio had been recorded.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of Engineering
An experimental and numerical investigation of heat transfer effect on cyclic fatigue of gas turbine blade
...Show More Authors

Blades of gas turbine are usually suffered from high thermal cyclic load which leads to crack initiated and then crack growth and finally failure. The high thermal cyclic load is usually coming from high temperature, high pressure, start-up, shut-down and load change. An experimental and numerical analysis was carried out on the real blade and model of blade to simulate the real condition in gas turbine. The pressure, temperature distribution, stress intensity factor and the thermal stress in model of blade have been investigated numerically using ANSYS V.17 software. The experimental works were carried out using a particular designed and manufactured rig to simulate the real condition that blade suffers from. A new cont

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Effect of Maximum Size of Aggregate on the Behavior of Reinforced Concrete Beams Analyzed using Meso Scale Modeling
...Show More Authors

In this study, simply supported reinforced concrete (RC) beams were analyzed using the Extended Finite Element Method (XFEM). This is a powerful method that is used for the treatment of discontinuities resulting from the fracture process and crack propagation in concrete. The mesoscale is used in modeling concrete as a two-phasic material of coarse aggregate and cement mortar. Air voids in the cement paste will also be modeled. The coarse aggregate used in the casting of these beams is a rounded aggregate consisting of different maximum sizes. The maximum size is 25 mm in the first model, and in the second model, the maximum size is 20 mm. The compressive strength used in these beams is equal to 26 MPa.

The subje

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Reinforcement Learning-Based Television White Space Database
...Show More Authors

Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Turbid of Water By Using Fuzzy C- Means and Hard K- Means
...Show More Authors

In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected  from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Measurement and Analysis of Bubble Size Distribution in the Electrochemical Stirred Tank Reactor
...Show More Authors

The dimensions of bubbles were measured in a stirrer tank electrochemical reactor, where the analysis of the bubble size distribution has a substantial impact on the flow dynamics. The high-speed camera and image processing methods were used to obtain a reliable photo. The influence of varied air flow rates (0.3; 0.5; 1 l/min) on BSD was thoroughly investigated. Two types of distributors (cubic and circular) were examined, and the impact of various airflow rates on BSD was investigated in detail. The results showed that the bubbles for the two distributors were between 0.5 and 4.5 mm. For both distributors at each airflow, the Sauter mean diameter for the bubbles was calculated. According to the results, as the flow rate raised, the bubb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Identification of Bacterial Strains Isolated from Patients with Urinary Tract Infection and the Role of Plasmids in their Antibiotic Resistance
...Show More Authors

  One hundred fifty bacterial strains were isolated from patients with urinary tract infections (UTIs). They were belong to ten different species of gram-negative bacteria and to two genera of gram–positive bacteria. E. coli was the major causative agent and comprise 40% of all cases. Klebsiella pneumoniae and Proteus mirabilis were second and third with 18.67% & 18.0% respectively. Other gram-negative bacteria were belong to the genera Enterobacter, Acinitobacter, Pseudomonas, Citrobacter and Serratia. Ten cases (6.67%) were caused by genus Staphylococcus and seven (4.66%) were caused by Streptococcus. Out of the 150 positive cases, 96(64%) were from female patients, while 54(36%) were from males. High percentage of all

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The relationship between the rule of mental improvement and ugliness and the objectives of Sharia And its impact on rulings
...Show More Authors

The research addresses a fundamental Islamic jurisprudential Purposeful issue, which is (Sharia), and to indicate the impact of this on Islamic jurisprudence, deriving rulings and extracting purposes, and to repel the illusion that this issue is only doctrinal, and clarifying the aspects of similarities and links between them by explaining the origin of deriving the purposes of Islamic Law (Sharia) through the meanings and wisdom learned from the texts and the explanation of the rulings. The rulings of Islamic Law (Sharia) have urged bringing benefits and repelling harms, and that the path to do so is reason and its production. I began the research by defining the purposes of Islamic Law (Sharia), then defining the rule of rational right

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 12 2025
Journal Name
Patents At Diyala University
جهاز (قفاز قياس القوة)
...Show More Authors

View Publication Preview PDF