Preferred Language
Articles
/
joe-2300
Image Compression Using 3-D Two-Level Technique
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid
technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Optimum Dimensions of Hydraulic Structures and Foundation Using Genetic Algorithm coupled with Artificial Neural Network
...Show More Authors

      A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Target Costing in Implementation Confrontational Strategy Applied study in General Company for Electronic Industries
...Show More Authors

This research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy  and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.

The economic units are not differentiators and not c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Transient Stability Enhancement and Critical Clearing Time Improvement for Kurdistan Region Network using Fact Configuration
...Show More Authors

The Electrical power system has become vast and more complex, so it is subjected to sudden changes in load levels. Stability is an important concept which determines the stable operation of the power system. Transient stability analysis has become one of the significant studies in the power system to ensure the system stability to withstand a considerable disturbance. The effect of temporary occurrence can lead to malfunction of electronic control equipment. The application of flexible AC transmission systems (FACTS) devices in the transmission system have introduced several changes in the power system. These changes have a significant impact on the power system protection, due to differences inline impedance, line curre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Comparative Study of Water Desalination using Reverse Osmosis (RO) and Electro-dialysis Systems (ED): Review
...Show More Authors

The increasing drinking water demand in many countries leads to an increase in the use of desalination plants, which are considered a great solution for water treatment processes. Reverse osmosis (RO) and electro-dialysis (ED) systems are the most popular membrane processes used to desalinate water at high salinity. Both systems work by separating the ionic contaminates and disposing of them as a brine solution, but ED uses electrical current as a driving force while RO uses osmotic pressure. A direct comparison of reverse osmosis and electro-dialysis systems is needed to highlight process development similarities and variances. This work aims to provide an overview of previous studies on reverse osmosis and electro-dial

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Cleaner Waste Systems
Performance enhancement of natural asphalt using waste-derived modifiers: Sugarcane molasses and waste engine oil
...Show More Authors

The growing demand for sustainable and high-performance asphalt binders has prompted the exploration of waste-derived modifiers. This study investigates the performance enhancement of Natural Asphalt (NA) using Sugarcane Molasses (SM) and Waste Engine Oil (WEO). The modified blends were prepared by partially replacing 50 % NA with varying proportions of SM and WEO ranging from 10 % to 40 % of the total weight of NA. Comprehensive testing was conducted, including penetration, softening point, ductility, viscosity, Bending Beam Rheometer (BBR), Multiple Stress Creep Recovery (MSCR), Energy Dispersive X-ray Spectroscopy (EDX), Fourier Transform Infrared (FTIR) spectroscopy, and Scanning Electron Microscopy (SEM). The results demonstrated that

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Estimation of the reliability function of the Rayleigh distribution using some robust and kernel methods
...Show More Authors
Abstract<p>The research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Nuclear structure study of 20Ne, 24Mg, 28Si and 32S nuclei using Skyrme-Hartree-Fock method
...Show More Authors

The Skyrme–Hartree–Fock (SHF) method with the Skyrme
parameters; SKxtb, SGII, SKO, SKxs15, SKxs20 and SKxs25 have
been used to investigate the ground state properties of some 2s-1d
shell nuclei with Z=N (namely; 20Ne, 24Mg, 28Si and 32S) such as, the
charge, proton and matter densities, the corresponding root mean
square (rms) radii, neutron skin thickness, elastic electron scattering
form factors and the binding energy per nucleon. The calculated
results have been discussed and compared with the available
experimental data.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Mon Dec 01 2025
Journal Name
Case Studies In Construction Materials
Optimized stress-strain modeling of eco-friendly fiber-reinforced concrete members using meta-heuristic algorithms
...Show More Authors

Eco-friendly concrete is produced using the waste of many industries. It reduces the fears concerning energy utilization, raw materials, and mass-produced cost of common concrete. Several stress-strain models documented in the literature can be utilized to estimate the ultimate strength of concrete components reinforced with fibers. Unfortunately, there is a lack of data on how non-metallic fibers, such as polypropylene (PP), affect the properties of concrete, especially eco-friendly concrete. This study presents a novel approach to modeling the stress-strain behavior of eco-friendly polypropylene fiber-reinforced concrete (PFRC) using meta-heuristic particle swarm optimization (PSO) employing 26 PFRC various mixtures. The cement was partia

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials &amp; Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref