Preferred Language
Articles
/
1hd4OI8BVTCNdQwC02PB
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on an adaptive, error bounded coding system, and it uses the DCT compression scheme. The performance of the developed compression system was analyzed and compared with those attained from the universal standard JPEG, and the results of applying the proposed system indicated its performance is comparable or better than that of the JPEG standards.</p>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Crossref
Publication Date
Thu Aug 18 2022
Journal Name
Dental Hypotheses
Microleakage Evaluation of Glass Hybrid Restoration Following Usage of Papain-Based Gel and Ceramic Bur for Caries Removal: An in Vitro Study
...Show More Authors

Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Activity- Based Costing technology and its role in Cost Guidance: An Applied Study at the General Company for Textile and Leather Industries - Leather plant - Factory No. (7)
...Show More Authors

Iraqi industrial units face strong competition due to many problems including1- high production costs2- weak interest in studying the market3- lack of government support for their products4- dumping the market with imported products with specifications and a competitive price as well as adopting the traditional cost system in calculating costs that do not provide appropriate information for pricing decisions Which requires studying and analyzing these problems and dealing with them by adopting modern technologies so that they can compete, so the research aims to show the knowledge bases of technology Activity- Based Costing, with an indication of the role of technology Activity- Based Costing in rationalizing the tax In, and the

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Engineering
A Hybrid Coefficient Decimation- Interpolation Based Reconfigurable Low Complexity Filter Bank for Cognitive Radio
...Show More Authors

Non uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band at

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 04 2020
Journal Name
Al-kindy College Medical Journal
Epidemiological Characteristics of Animal Bite Cases Recorded by Case based Surveillance in Iraq 2012
...Show More Authors

Background: Animal bite is one of the public health problems all over the world, especially in poor countries. Animal bites have an impact on human health due to rabies disease, which is a viral transmitted disease from animal to human with a high mortality rate.
Objective: To determine the epidemiological characteristics of animal bite cases by person, time, and place.
Method: Descriptive cross sectional study was done by reviewing cases caused by animal bites., Data including the demographic characteristics of age, gender, occupation, site of bite, and attending health institutions searching treatment were all included.
Results: There were 11600 animal bite cases. Most of bites caused by stray dogs 11577(99.8%), and the males

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Airborne Computer System Based Collision-Free Flight Path Finding Strategy Design for Drone Model
...Show More Authors

View Publication
Scopus (9)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of King Saud University - Engineering Sciences
Particle swarm optimization technique-based prediction of peak ground acceleration of Iraq’s tectonic regions
...Show More Authors

Peak ground acceleration (PGA) is one of the critical factors that affect the determination of earthquake intensity. PGA is generally utilized to describe ground motion in a particular zone and is able to efficiently predict the parameters of site ground motion for the design of engineering structures. Therefore, novel models are developed to forecast PGA in the case of the Iraqi database, which utilizes the particle swarm optimization (PSO) approach. A data set of 187 historical ground-motion recordings in Iraq’s tectonic regions was used to build the explicit proposed models. The proposed PGA models relate to different seismic parameters, including the magnitude of the earthquake (Mw), average shear-wave velocity (VS30), focal depth (FD

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 14 2023
Journal Name
Iete Journal Of Research
Performance Enhancement of VLC-NOMA Employing Beamforming Function based vehicle-to-multivehicle Communication system
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Highly Sensitive Fiber Brag Grating Based Gas Sensor Integrating Polyaniline Nanofiber for Remote Monitoring
...Show More Authors

View Publication
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref