Preferred Language
Articles
/
sheWKY4BVTCNdQwCzzud
Terrestrial Laser Scanning to Preserve Cultural Heritage in Iraq Using Monitoring Techniques
...Show More Authors

English

View Publication
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 27 2023
Journal Name
Tem Journal
Predicting Age and Gender Using AlexNet
...Show More Authors

Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application

... Show More
View Publication
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Feb 28 2026
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment, And Sustainability: Tmrees23fr
Hyperspectral pansharpening improvement using MNF transformation
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 17 2019
Journal Name
Journal Of The College Of Education For Women
A New Logic of Victory in Suzanne Collins’ The Hunger Games With Reference to Elements of Intertextuality in William Golding’s Lord of the Flies
...Show More Authors

Suzanne Collins’ novel  The Hunger Games suggests a new logic of victory and set a distinguished focus on the unique personality of her heroin which brings to the mind the permanent correlation between all moral values. The Hunger Games World seems to be much more like one big bowl as it links the past, present, and the future. An Intertextual reference is interwoven in the present research as it brings Golding’s Lord of the Flies to the surface, and it highlights certain similarities between the two texts. In which Ralph, Piggy and Simon in Golding’s Lord of the Flies are the incarnations of stable moral values and hope of surviving ethics and rules in a chaotic and turmoil world. The event

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 28 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Cone Beam Computed Tomography in an Evaluation and Diagnosis of Anatomical Variations and Pathological Lesions in Maxillary Sinus Prior to Maxillary Sinus Lift Surgery
...Show More Authors

Abstract: Thorough assessment of the Maxillary,Sinus is very important. Recently 3-dimensional imagewith Cone Beam Computed Tomography (CBCT) is very dependable in Maxillary Sinus diagnosis. The aim of this study is to: shade light on the role of (CBCT) diagnosis of the maxillary sinus anatomical variation and pathological finding among smokers and nonsmokers prior to maxillary sinus lift techniques. Materials and Method: In this study 60 males with age ranged between 20-50 years old, referred for (CBCT) assessment of maxillary sinus in the Specialist Health Center of AL-Sadder city. The scanning were performed using Kodak 9500 (CBCT), the KV was 90, mA10 and scanning time 10 s. Voxel size 0.3mm with( DICOM ) software on a multiplaner re

... Show More
View Publication Preview PDF
Crossref