Preferred Language
Articles
/
joe-265
Valuation of Construction Projects Based on of Quantity Scale by using Expert System
...Show More Authors

The subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.

The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Oct 04 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The

... Show More
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Review on Vision Based Real Time Fingertip Detection Approaches
...Show More Authors

    Computer vision is an emerging area with a huge number of applications. Identification of the fingertip is one of the major parts of those areas. Augmented reality and virtual reality are the most recent technological advancements that use fingertip identification. The interaction between computers and humans can be performed easily by this technique. Virtual reality, robotics, smart gaming are the main application domains of these fingertip detection techniques. Gesture recognition is one of the most fascinating fields of fingertip detection. Gestures are the easiest and productive methods of communication with regard to collaboration with the computer. This analysis examines the different studies done in the field of

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Foreground Object Detection and Separation Based on Region Contrast
...Show More Authors

Foreground object detection is one of the major important tasks in the field of computer vision which attempt to discover important objects in still image or image sequences or locate related targets from the scene. Foreground objects detection is very important for several approaches like object recognition, surveillance, image annotation, and image retrieval, etc. In this work, a proposed method has been presented for detection and separation foreground object from image or video in both of moving and stable targets. Comparisons with general foreground detectors such as background subtraction techniques our approach are able to detect important target for case the target is moving or not and can separate foreground object with high det

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 02 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Gallium Selective PVC Membrane Electrodes Based on Crown Ethers
...Show More Authors

Gallium  selective  e lectrodes   based  on  12-crown-4  (12C4)  and benzo-15-crown-5   (B15C5)  and  plasticizers   dioctyl  phenyl phosphonate   (DOPP),   dibutyl  phosphate  (DBP),  dibutyl  phthalate (DBPH)  in  PVC  matrix  membranes  are  constructed.  Specific properties  of  the electrodes  are  studied  including  calibration  curve, slope  detection limit, concentration  

+

 
... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Fast Temporal Video Segmentation Based on Krawtchouk-Tchebichef Moments
...Show More Authors

View Publication
Scopus (37)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Adaptive Medical Image Watermarking Technique based on Wavelet Transform
...Show More Authors

In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Data Hiding in 3D Model Based on Surface Properties
...Show More Authors

    Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref