Preferred Language
Articles
/
JxbtIIgBVTCNdQwCaXTN
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 12 2021
Journal Name
Engineering, Technology And Applied Science Research
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit

... Show More
Scopus (30)
Crossref (26)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Science And Research (ijsr)
Color-based for tree yield fruits image counting
...Show More Authors

Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes On Data Engineering And Communications Technologies
Utilizing Deep Learning Technique for Arabic Image Captioning
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Abstract Pattern Image Generation using Generative Adversarial Networks
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm for Improving the Quantity and Quality of the Detected Complexes from Protein Interaction Networks
...Show More Authors

One of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Novel Coronavirus Pandemic as it is Expressed by Children in Their Drawings On-line: An Analytical Study: نزار بن صالح أحمد عبد الحفيظ
...Show More Authors

This study aimed at identifying how children express the emerging coronavirus in general and according to their age groups (4-13 years) by analyzing 91 of their drawings published online, using the descriptive content analytical approach. The results showed that children's artistic expression of the virus came according to the concepts and ideas they carried about the virus for the age groups of (4-7 years) and (7-9 years), while it came according to visual perception for age groups (9-11 years), and from (11-13) years. Also, most children were aware about the presence of the virus and its widespread around the world, but (99%) of them do not realize the seriousness of the virus. It was confirmed that between (25-34%) of children were su

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
An Experimental Study on the Effect of Shape and Location of Vortex Generators Ahead of a Heat Exchanger
...Show More Authors

An experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .

In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.                     

The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect The behavior of workers in the insurance companies in achieving competitive advantage: An Applied research in a sample of the general insurance companies
...Show More Authors

Service companies always working to increase their competitiveness and efficiency of the survival, growth and development in the present and the future, including insurance companies, so as to increase competition, especially after the emergence of the civil companies dramatically after 2003, has become the goal of recent studies carried out by the organizations is the human capital, because its success and excellence and achievement its objectives depends on the human, and this does not mean that the other components are not important, but also rely on the rights which has increased interest in the search for the way in which they can guide the behaviors and values ​​and their own language in line with the organization's strategy an

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref