Preferred Language
Articles
/
lBfJvY0BVTCNdQwC3RpA
Image Denoising Using Multiwavelet Transform with Different Filters and Rules
...Show More Authors

<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt&amp; pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by using Peak Signal to Noise Ratio (PSNR). Depend on the value of PSNR that explained in the result section; we conclude that the (Tri-State Median filter) is better than (Switching Median filter) in denoising image quality, according to the results of applying rules the result of the Shrinking rule for each filter shows that the best result using first the Bivariate Shrink.</p>

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes On Data Engineering And Communications Technologies
Utilizing Deep Learning Technique for Arabic Image Captioning
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

View Publication
Scopus (3)
Scopus
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Theoretical and Experimental Study of Corrosion Behavior of Carbon Steel Surface in 3.5% NaCl and 0.5 M HCl with Different Concentrations of Quinolin-2-One Derivative
...Show More Authors

A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namely 7-Ethyl-4-methyl-1-[(4-nitro-benzylidene)-amino]-1H-quinolin-2-one (EMNQ2O). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G/ 2d, 2p level was carried out to calculate the geometrical structure, physical properties and chemical inhibition chemical parameters, with the local reactivity in order to predict both the reactive centers and to know the possible sites of nucleophilic and electrophilic attacks, in vacuum and two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in (3.5% NaCl)

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 27 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of fracture strength of endodontically treated teeth restored by milled zirconia post and core with different post and core systems (An in vitro comparative study)
...Show More Authors

Background: Restoration of root canal treated teeth with a permanent restoration affect in the success of endodontically treated teeth. This in vitro study was performed to evaluate and compare the fracture strength of endodontically treated teeth restored by using custom made zirconium posts and cores, prefabricated carbon fiber, glass fiber and zirconium ceramic posts. Materials and method: Forty intact human mandibular second premolars were collected for this study and were divided into five groups. Each group contains 8 specimens: Group1: Teeth restored with Carbon Fiber Posts; Group2: Teeth restored with Glass Fiber Posts; Group3: Teeth restored with Zirconium Ceramic prefabricated Posts; Group4: Teeth restored with Zirconium Posts

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 27 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of thermocycling and different pH of artificial saliva on the impact and transverse strength of heat cure resin reinforced with silanated ZrO2 nano-fillers.
...Show More Authors

Background: The aim of this study was to evaluate the effect of thermo cycling and different pH of artificial saliva (neutral, acidic, basic) on impact and transverse strength of heat cure acrylic resin reinforced of with 5% silanated ZrO2 nano fillers. Materials and methods: 120 samples were prepared, 60 samples for impact strength test and another 60 samples for transverse strength test, for each test, samples were divided into two major groups (before and after thermo cycling), then each of these major groups were further subdivided into 3 subgroups according to the pH of prepared artificial saliva (neutral, acidic, basic). Charpy impact device was used for impact strength test and Flexural device was used for transverse strength test. R

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Enamel Protective Agent on Shear and Tensile Bond Strength of Stainless Steel Brackets by Using Different Adhesive Agents (In Vitro Study)
...Show More Authors

Background: Decalcification of surface enamel adjacent to fixed orthodontic appliances, in the form of white spot lesions, is a wide spread and familiar well-known side effect of orthodontic treatment. The present study was carried out to evaluate the effect of enamel protective agent (Clinpro white varnish) on shear and tensile bond strength of Dentaurum orthodontic stainless steel brackets by using 3M Unitek and Ormco as orthodontic adhesive agents. Materials and methods: Sixty-four extracted human upper first premolar teeth were selected and randomly divided into two groups with 32 teeth each, representing the shear and tensile bond strength testing groups. Then according to the type of bonding adhesive and the addition of Clinpro before

... Show More
View Publication Preview PDF
Crossref