Preferred Language
Articles
/
jih-903
Image Improvement Using The Combination of Wavelet and Multiwavelet Transform
...Show More Authors

      This paper introduces method of image enhancement using the combination of both wavelet and Multiwavelet transformation. New technique is proposed for image enhancement using one smoothing filter.

    A critically- Sampled Scheme of preprocessing method is used for computing the Multiwavelet.It is the 2nd norm approximation used to speed the procedures needed for such computation.

  An improvement was achieved with the proposed method in comparison with the conventional method. 

The performance of this technique has been done by computer using Visual Baisec.6 package.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Validity of 3D Reconstructed Computed Tomographic Image in Using Craniometrical Measurements of the Skull for Sex Differentiation (An Iraqi Study)
...Show More Authors

Background: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images.

... Show More
View Publication Preview PDF
Publication Date
Sat May 07 2022
Journal Name
American Journal Of Economics And Business Management
The Integrating Effect Resource Consumption Accounting (RCA) and Enterprise Resource Planning (ERP) On Cost Reduction and Quality Improvement
...Show More Authors

The research aims to examine the integration effect among resource consumption accounting (RCA) system and the enterprise resource planning (ERP) on both costs reduction and quality improvement. The study questioner form distributed to two different respondents as the unit of analysis. The research reached various conclusions most important of which is the integration relationship can help solve the special difficulties in managing the economic unit data. Moreover, the integration provides a clear picture of the causal relationships between resources, resource quantities, and associated costs

Preview PDF
Publication Date
Wed Oct 16 2013
Journal Name
International Journal Of Pharmacy And Pharmaceutical Sciences
Effects of mucoadhesive polymers combination on the properties of lisinpril buccal tablets prepared by wet granulation method
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sun Feb 02 2025
Journal Name
Al–bahith Al–a'alami
THE EFFECT OF FASHIONISTA ON FEMALE BODY IMAGE
...Show More Authors

The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of the Number of Gaussian Points and Their Distribution on Image Quality
...Show More Authors

This  research  involves  studying  the  influence  of  increasing  the

number of Gaussian points and the style of their distribution, on a circular exit pupil, on the numerical calculations accuracy of the point spread function for an ideal optical system and another system having focus error of (0.25 A. and 0.5 A. )

It was shown that the accuracy of the results depends on the type of

distributing points on the exit pupil. Also, the accuracy increases with the increase of the number of points (N) and the increase of aberrations which requires on increas (N).

View Publication Preview PDF
Publication Date
Wed Aug 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Ascorbic Acid on Pathogenic Staphylococcus aureus Growth singly and in Combination with Some Antibiotics
...Show More Authors

 One hundred and fifteen isolates of Staphylococcus aureus were isolated from human infected wound and burn. The resistance of this organism for eight commonly used antibiotics was determined by disc diffusion methods.          The minimum inhibitory concentration MIC was determined for each drug by tube dilution method. Results showed significant variations in the MIC values. It was found that two isolates had high resistance for the eight antibiotics used. Effect of ascorbic acid on bacterial growth was studied singly and in combination with antibiotics. Reductions in MIC value were reported for different antibiotics when tested by growth curve method too. 

View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Tue Aug 10 2021
Journal Name
Design Engineering
Lossy Image Compression Using Hybrid Deep Learning Autoencoder Based On kmean Clusteri
...Show More Authors

Image compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye

... Show More
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Robust Blind Watermarking Technique Against Geometric Attacks for Fingerprint Image Using DTCWT-DCT
...Show More Authors

In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref