Preferred Language
Articles
/
DRZrZYoBVTCNdQwCMZ2H
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression.

View Publication
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Iraqi Geological Journal
Subsurface Structural Image of Galabat Field, North East of Iraq Using 2D Seismic Data
...Show More Authors

This research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narr

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Solving Fractional Damped Burgers' Equation Approximately by Using The Sumudu Transform (ST) Method
...Show More Authors

       In this work, the fractional damped Burger's equation (FDBE) formula    = 0,

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Some properties of finite dimensional fuzzy anti-normed linear spaces
...Show More Authors

            In this paper the definition of fuzzy anti-normed linear spaces and its basic properties are used to prove some properties of a finite dimensional fuzzy anti-normed linear space.    

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Strategic Effects of Mubarak Great Port on Iraq
...Show More Authors

The Iraqi-Kuwaiti relations represent a great issue for the Arab-Arab relations. This relation is characterized by specificity for the tension since the foundation of the State of Kuwait until late. There are many factors that prevented the fulfillment of the aspiration towards the development of the relations, perhaps the most important of which is the issue of Mubarak Great Port which is a difficult issue as far as the relation between the two states is concerned. One year after Iraq put the cornerstone of the Great Faw Port. This is considered as the most important hurdle in front of constructing the relations with the neighbor Kuwait

View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
المجلة السياسية والدولية
الذكاء الاصطناعي والوجود الإنساني: قراءة فكرية في الابعاد العسكرية
...Show More Authors

تُعد فكرة الذكاء الاصطناعي من العلوم الحديثة التي ارتبطت بالإنسان منذ العقود الخمسة الماضية، وأصبحت السياسة الرقمية جزءاً لا يتجزأ من المجتمع لكونها تُستخدم في أغلب مجالات حياة الانسان. وهذا ما شجع صانعوا السياسات التكنولوجية الجديدة في التفكير بكيفية توظيفها لخدمة مصالحهم العليا السياسية والعسكرية، للتعزيز من قوتهم ونفوذهم، وغاضين النظر عن بذل الجهود للتفكير في تنظيمهم للذكاء الاصطناعي التوليدي، ووضعه

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
مجلة دراسات دولية
الذكاء الاصطناعي والوجود الإنساني: قراءة فكرية في الابعاد الاجتماعية
...Show More Authors

Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
مجلة قضايا سياسية
الذكاء الاصطناعي والوجود الإنساني: قراءة فكرية في الابعاد الاقتصادية
...Show More Authors

يعد الذكاء الاصطناعي من العلوم الحديثة التي ارتبطت بالإنسان منذ العقود الخمسة الماضية، ولتصبح السياسة الرقمية الاقتصادية جزءاً لا يتجزأ من المجتمع، لكونها خرقت أغلب مجالات حياة الانسان. وهذا ما شجع صانعوا السياسات التكنولوجية الجديدة في التفكير بكيفية توظيفه لخدمة مصالحهم الاقتصادية العُليا، بغض النظر عن بذل الجهود للتفكير في مصالح الانسان الاقتصادية وتنظيمهم ومراقبة الذكاء الاصطناعي التوليدي. لقد أيقن

... Show More
View Publication Preview PDF