Preferred Language
Articles
/
URZk1YoBVTCNdQwCDqaF
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Materials Science In Semiconductor Processing
Enhancing charge transfer in 0D/2D cobalt sulfide/boron-doped graphitic carbon nitride heterojunction photocatalyst for degradation of organic pollutants under LED illumination
...Show More Authors

Semiconductor-based photocatalytic processes are widely applied as ecofriendly technology for degrading organic pollutants. Establishing photocatalytic heterojunctions with Z-type photocarriers transfer pathways is projected to be a superb strategy to enhance photocatalytic behavior. In this paper, novel and stable (0D/2D) heterojunctions of CoS-embedded boron-doped g-C3N4 (CoS/BCN) with a high rate of charges transfer/separation were assembled for degradation of malachite green dye (MG). The CoS/BCN photocatalyst achieves a photodegradation efficiency of 96.9 % within 1 h of LED illumination, which is 2.5 and 1.4-fold enhancement compared with bare g-C3N4 and BCN, respectively. Besides, the results of species-trapping trials exhibited that

... Show More
View Publication
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
An An Accurate Estimation of Shear Wave Velocity Using Well Logging Data for Khasib Carbonate Reservoir - Amara Oil Field
...Show More Authors

   

Shear and compressional wave velocities, coupled with other petrophysical data, are vital in determining the dynamic modules magnitude in geomechanical studies and hydrocarbon reservoir characterization. But, due to field practices and high running cost, shear wave velocity may not available in all wells. In this paper, a statistical multivariate regression method is presented to predict the shear wave velocity for Khasib formation - Amara oil fields located in South- East of Iraq using well log compressional wave velocity, neutron porosity and density. The accuracy of the proposed correlation have been compared to other correlations. The results show that, the presented model provides accurate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Improvement of the monochrome image hologram by using a random phase and increasing number of Samples
...Show More Authors

This paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Studying the contribution of components and type of spiral galaxy NGC 6946 using digital image processing
...Show More Authors

NGC 6946 have been observed with BVRI filters, on October 15-18,
2012, with the Newtonian focus of the 1.88m telescope, Kottamia
observatory, of the National Research Institute of Astronomy and
Geophysics, Egypt (NRIAG), then we combine the BVRI filters to
obtain an astronomical image to the spiral galaxy NGC 6946 which
is regarded main source of information to discover the components of
this galaxy, where galaxies are considered the essential element of
the universe. To know the components of NGC 6946, we studied it
with the Variable Precision Rough Sets technique to determine the
contribution of the Bulge, disk, and arms of NGC 6946 according to
different color in the image. From image we can determined th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of an Educational Program in Light Of Behavioral Cognitive Theory to Develop Efficient Response to Students Affected by Crises
...Show More Authors

The aim of this research is to construct an educational program in light of the theory of behavioral cognitive and its impact on the development of the efficient response to students affected by crises (centers of your right to education). To achieve the objectives of the research, two scales were developed by the researcher in addition to two equivalent hypotheses were formulated. The scale contains (26) items divided into five fields; for its validity and reliability were derived based on the measure of efficient response, an educational program based on the theory of behavioral cognition. The test and the educational program were applied to a sample of (60) students from the centers of your right to education, divided into experimenta

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 09 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation,
The Violation of Religious Human Rights: A sample Analysis of an Offensive Image of Islamic Concept
...Show More Authors

The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju

... Show More
Preview PDF