Preferred Language
Articles
/
FBYMBYcBVTCNdQwCfi4Y
Orthogonal polynomial embedded image kernel
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
Estimation of kidney tumor volume in CT images using medical image segmentation techniques
...Show More Authors

Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. Accurate estimation of kidney tumor volume is essential for clinical diagnoses and therapeutic decisions related to renal diseases. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors that addresses the challenges of accurate kidney tumor volume estimation caused by extensive variations in kidney shape, size and orientation across subjects.
In this paper, have tried to implement an automated segmentati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
Advertising Image Semiotics in the Printed Poster: عبد الحسين عبد الواحد عبد الرزاق
...Show More Authors

The present research aims at revealing the advertising image semiotics in the American printed poster by following the image's significance and its transformations through the poster design trends and indicating its nature whether it is an explicit or implicit image. The limits of the research were the American printed poster during 2016-2018 period. The theoretical side was determined by two sections, the first: (the advertising image semiotics) and the second (design trends in the printed poster). The research procedures were represented by the research method adopted in the analysis of the sample models identified in four models taken from the research community which contains (24) models. The selection was made according to the trend

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Aesthetics of Hybrid Digital Image Technologies in TV Drama: محمد ثائر عدنان البياتي
...Show More Authors

      TV medium derives its formal shape from the technological development taking place in all scientific fields, which are creatively fused in the image of the television, which consists mainly of various visual levels and formations. But by the new decade of the second millennium, the television medium and mainly (drama) became looking for that paradigm shift in the aesthetic formal innovative fields and the advanced expressive performative fields that enable it to develop in treating what was impossible to visualize previously. In the meantime, presenting what is new and innovative in the field of unprecedented and even the familiar objective and intellectual treatments. Thus the TV medium has sought for work

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Body image and Physical Perception of children with Precocious Puberty in Baghdad city
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Mar 03 2022
Journal Name
Multimedia Tools And Applications
Boosting Marine Predators Algorithm by Salp Swarm Algorithm for Multilevel Thresholding Image Segmentation
...Show More Authors

View Publication
Scopus (49)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Iraqi Geological Journal
Subsurface Structural Image of Galabat Field, North East of Iraq Using 2D Seismic Data
...Show More Authors

This research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narr

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref