Preferred Language
Articles
/
jih-740
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in cover image. Experiments show that this method gets stego image with perceptual invisibility, and better secrecy. The proposed method was implemented using MATLAB 7.8.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of tbe Intensity Distribution by Image Processing
...Show More Authors

Image   processing   is  an   important   source   for   the  image

analytical    in   order    to    get   variable    parameters    such   as   the

intensity  .In  present   work  it  has  been  found   a  relation   between the  tensity and  number    of  pixd  in  the  image  ,  and  from  this relation   we  have   got   in  this  paper   the  inten

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Adaptive inter frame compression using image segmented technique
...Show More Authors

The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.

           Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 12 2021
Journal Name
Engineering, Technology And Applied Science Research
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit

... Show More
Scopus (25)
Crossref (20)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-nahrain Journal Of Science
Image Classification Using Bag of Visual Words (BoVW)
...Show More Authors

In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.

View Publication Preview PDF
Crossref (23)
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

View Publication
Scopus (5)
Scopus
Publication Date
Wed Mar 13 2024
Journal Name
Journal Of Robotics
Hierarchical Stabilization and Tracking Control of a Flexible-Joint Bipedal Robot Based on Anti-Windup and Adaptive Approximation Control
...Show More Authors

Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv

... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
COVID-19 Diagnosis Using Spectral and Statistical Analysis of Cough Recordings Based on the Combination of SVD and DWT
...Show More Authors

Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopt

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
  Positional Accuracy Assessment for Updating Authoritative Geospatial Datasets Based on Open Source Data and Remotely Sensed Images
...Show More Authors

OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain

... Show More
View Publication Preview PDF
Crossref (2)
Crossref