Preferred Language
Articles
/
joe-2300
Image Compression Using 3-D Two-Level Technique
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid
technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Car Logo Image Extraction and Recognition using K-Medoids, Daubechies Wavelets, and DCT Transforms
...Show More Authors

     Recognizing cars is a highly difficult task due to the wide variety in the appearance of cars from the same car manufacturer. Therefore, the car logo is the most prominent indicator of the car manufacturer. The captured logo image suffers from several problems, such as a complex background, differences in size and shape, the appearance of noise, and lighting circumstances. To solve these problems, this paper presents an effective technique for extracting and recognizing a logo that identifies a car. Our proposed method includes four stages: First, we apply the k-medoids clustering method to extract the logo and remove the background and noise. Secondly, the logo image is converted to grayscale and also converted to a binary imag

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE: GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE
...Show More Authors

This researchpaper includes the incorporation of Alliin at various energy levels and angles 

With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Computer Generation of Low Light-Level Images
...Show More Authors

As result of exposure in low light-level are images with only a small number of
photons. Only the pixels in which arrive the photopulse have an intensity value
different from zero. This paper presents an easy and fast procedure for simulating
low light-level images by taking a standard well illuminated image as a reference.
The images so obtained are composed by a few illuminated pixels on a dark
background. When the number of illuminated pixels is less than 0.01% of the total
pixels number it is difficult to identify the original object.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Mental-math level of intermediate school students
...Show More Authors

The study seeks to explore the mental-math level among intermediate-school students. To this end, the researcher raised a question. What the level of mental math among students in the intermediate stage? Total of (576) male and female students were chosen from different schools at Al-karkh side \ general directorate of Baghdad education. So as to answer research question and hypothesis, a questionnaire of (30) items designed by the authors was administered to the study sample. T-test was used to analyze the collected data at the level of significance (0.05). Expectancy means (15) showed significant difference comparing to the achieved mean (10, 10) on mental-math test. The study concluded with students has a low level of mental math. The

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Fabrication of Copper-Graphite MMCs Using Powder Metallurgy Technique
...Show More Authors

Copper, and its, alloys and composites (being the matrix), are broadly used in the electronic as well as bearing materials due to the excellent thermal and electrical conductivities it has.

In this study, powder metallurgy technique was used for the production of copper graphite composite with three volume perc ent of graphite.  Processing parameters selected is (900) °C sintering temperature and (90) minutes holding time for samples that were heated in an inert atmosphere (argon gas). Wear test results showed a pronounced improvement in wear resistance as the percent of graphite increased which acts as solid lubricant (where wear rate was decreased by about 88% as compared with pure Cu). Microhardness and

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jul 25 2021
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Survey paper on Lossy Audio Compression Methods
...Show More Authors

During the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
Quantum Image Watermarking Based on Wavelet and Geometric Transformation
...Show More Authors

Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
The nuclear level density parameter
...Show More Authors

The nuclear level density parameter  in non Equi-Spacing Model (NON-ESM), Equi-Spacing Model (ESM) and the Backshifted Energy Dependent Fermi Gas model (BSEDFG) was determined for 106 nuclei; the results are tabulated and compared with the experimental works. It was found that there are no recognizable differences between our results and the experimental -values. The calculated level density parameters have been used in computing the state density as a function of the excitation energies for 58Fe and 246Cm nuclei. The results are in a good agreement with the experimental results from earlier published work.

View Publication Preview PDF
Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Magic Square of Order 3 To Solve Sudoku Grid Problem
...Show More Authors

   The research tackled to solve Sudoku grid problem 9 ×9 , one of artificial intelligence problems. This problem has many of solutions in search space to generate Sudoku grid by using magic square of odd order as 3. This research concludes solution by proposed heuristic algorithm from magic square of odd order as 3 and no given numbers (from 1 to 9) in each cell of nine Sudoku grid cells in starting of problem solution, this is not similar the solution in old classic methods to generate all sub grids in Sudoku grid. The experimental results in this paper show the easily implementation to solve the problem to manage without manual method, additional to position of numbers (1, 2,..9) in center of each sub grid in Sudoku grid

... Show More
View Publication Preview PDF