Preferred Language
Articles
/
IherN48BVTCNdQwCvGOw
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity
...Show More Authors

The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art background subtraction models.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Measurement of Background Radioactivity in Sewage Sludge for Baghdad City Treatment Stations
...Show More Authors

Sewage sludge samples were collected from Al-rasafa and Al-karkh refinement stations which represent the main stations of Baghdad city. Samples were collected from all treatment stages: before, after, and during refinement processes. The High Purity Germanium Coaxial Detector system with energy resolution 1.8 keV for energy line 1333 keV of Co – 60 radioactive sources was used to measure radioactivity from both natural and artificial sources. GENIE – 2000 analysis the results statistically and qualitatively. The results showed that all sewage sludge samples exhibited natural radioactive level and sometimes less than the international regular standards, but Al–Karkh station showed increment in radioactive levels than Al– Rasa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Measurement of Background Radioactivity in Baghdad's Main Water Supply Stations: Sediment Samples
...Show More Authors

Sediment samples were collected from main water processing and supply plants in Baghdad, and tested for radioactivity from both natural and artificial sources. These stations are: East Dijla (Tigris), Al-Kadisia, Al-Karama, Al-Rasheed, Al-Sader, Al-Wathba, and Al-Wihda supply stations. Qualitative measurements were made, and the results showed that most sediments exhibited natural radioactive level and sometimes less than the international regular standards. Specially, K-40 and Ra-226 results were much less than the standards for radioactive concentrations. Ac-228 concentration was found rather than Th-232 (in Al-Sader and Al-Wihda samples) but with low concentrations of about 10-15 Bg/kg and detection confidence ~45% , and Ce-141 and Be

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Virulence surveillance of wheat black stem rust fungus
...Show More Authors

General survey for wheat rust diseases in Iraqi fields was done during the seasons of 2010, 2011 and 2012. The survey covered different fields in southern, middle and northern regions. Results of the first season indicated that most of Iraqi cultivars such as Tmmoze2, IPA 99 and Mexipak showed different types of susceptibility to both yellow and leaf rust infection. Disease severity increased when the conditions were favorable for infections with using susceptible cultivars. The severity of leaf rust was less in the north region comparing with the middle and south regions. Most of the introduced cultivars such as Sham6 and Cimmyto showed susceptible reaction to yellow and leaf rust. Yellow rust was in epiphytotic form at the Iraqi-Syrian-Tu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Aip Conference Proceedings
Analysis of performance measures with single channel fuzzy queues under two class by using ranking method
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 25 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Block Matching Algorithm Using Mean and Low Order Moments
...Show More Authors

In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
Violence and Extremism in Iraq: Approaches to Motives and Means of Confrontation
...Show More Authors

     After the year 2003, Iraq went through multiple waves of violence and at different levels on the security, intellectual, political and social levels. Behind that stood several motives and incentives to enable violence that represented the first axis of research, the most important of which was the political motives that circulated an atmosphere that politics against society and transformed power into a field of political brutality against the individual and the group at once. There are also cultural, intellectual, media and economic motives such as weak cultural independence, poverty, marginalization, unemployment and want, and the absence of a media discourse that rejects violence but incites it, on the other ha

... Show More
View Publication Preview PDF
Crossref