Preferred Language
Articles
/
oxfhgJEBVTCNdQwCxZXi
Elzaki transform decomposition approach to solve Riccati matrix differential equations
...Show More Authors

Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.

Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
linear equivalence determination of key-stream sequence using Z-Transform
...Show More Authors

the research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream

View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
FPGA Realization of Two-Dimensional Wavelet and Wavelet Packet Transform
...Show More Authors

 

The Field Programmable Gate Array (FPGA) approach is the most recent category, which takes the place in the implementation of most of the Digital Signal Processing (DSP) applications. It had proved the capability to handle such problems and supports all the necessary needs like scalability, speed, size, cost, and efficiency.

In this paper a new proposed circuit design is implemented for the evaluation of the coefficients of the two-dimensional Wavelet Transform (WT) and Wavelet Packet Transform (WPT) using FPGA is provided.

In this implementation the evaluations of the WT & WPT coefficients are depending upon filter tree decomposition using the 2-D discrete convolution algorithm. This implementation w

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Scale-Invariant Feature Transform Algorithm with Fast Approximate Nearest Neighbor
...Show More Authors

There is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Improvement Using The Combination of Wavelet and Multiwavelet Transform
...Show More Authors

      This paper introduces method of image enhancement using the combination of both wavelet and Multiwavelet transformation. New technique is proposed for image enhancement using one smoothing filter.

    A critically- Sampled Scheme of preprocessing method is used for computing the Multiwavelet.It is the 2nd norm approximation used to speed the procedures needed for such computation.

  An improvement was achieved with the proposed method in comparison with the conventional method. 

The performance of this technique has been done by computer using Visual Baisec.6 package.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Hand Gesture Recognition With Acoustic Myography and Wavelet Scattering Transform
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Combining Bourgoyne and Young Equations by Bagging Tree Regression to Predict Rate of Penetration in a Southern Iraqi Field, Case Study
...Show More Authors
Abstract<p>Achieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
(General corruption is an approach to tyrants and unjust in the perspective of the Holy Quran)
...Show More Authors

      That corruption with all its forms,  has prevailed over the whole world, but  with  different degrees relaying on the one who leads these countries of rulers, followers and officials who have been deemed  the main reason for that corruption, but if these  rulers  were righteous, These countries would have blessed and elevated and were corrupt unjust tyrants who were the disaster that befell the chiefs of those countries  with ruin, misery, and backwardness. This is what we sought to prove and clarify by considering the verses of the Holy Qur’an in respect with this topic. The research includes an introduction, two topics, and a conclusion.

   &nbsp

... Show More
View Publication Preview PDF