Preferred Language
Articles
/
abaa-39
Image of relief organizations for displaced Iraqis
...Show More Authors

This research aims to know the intellectual picture the displaced people formed about aid organizations and determine whether they were positive or negative, the researchers used survey tool as standard to study the society represented by displaced people living in Baghdad camps from Shiites, Sunnis, Shabak, Turkmen, Christians, and Ezidis.
The researcher reached to important results and the most important thing he found is that displaced people living in camps included in this survey hold a positive opinion about organizations working to meet their demands but they complain about the shortfall in the health care side.
The research also found that displaced people from (Shabak, Turkmen, and Ezidi) minorities see that international organizations are taking care of them more than the Iraqi ones, while the Shite and Sunni displaced people said that the Iraqi organizations were providing their needs more than other organizations and this reveal that the international organizations were paying more intention for minorities .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Future thinking skills for university students
...Show More Authors

The study aimed to identify the future thinking skills of university students and which of these skills are prevalent. The sample of the study consisted of (400) male and female students from the university students. In order to achieve the goals of the research, the researcher built a measure of future thinking skills based on Torrance theory (2003). Psychometric properties of the standards were extracted, which are represented by honesty and consistency and the application of the measures to the research sample. The researchers found that Future thinking skills of university students, and that the skill of future planning is the most common skill among the research sample.

View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al Kut Journal Of Economics And Administrative Sciences
The relationship of demographic diversity to institutional effectiveness An analytical study of a sample of workers in public organizations in Iraq
...Show More Authors

Diversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a

... Show More
Preview PDF
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
A Molecular and Biochemical Study for Cholesteryl Ester Transfer Protein (CETP) Taq1B in Iraqi Patients with Hyperlipidemia
...Show More Authors

Cholesteryl ester transfer protein gene contains some single nucleotide polymorphisms, which have been associated with serum high-density lipoprotein concentration and other lipoproteins. This study is done for determining of cholesteryl ester transfer protein polymorphism and evaluate its effect on serum lipid profile concentrations in some hyperlipidemic patients compared with healthy subjects in Salah Al-din governorate-Iraq. Blood samples were taken from (90) patients suffering from hyperlipidemia, and (70) samples that were apparently healthy controls.  Serum lipid concentrations were measured by enzymatic assays. The polymorphism was genotyped using polymerase chain reaction restriction fragment length polymorphism analysis.&n

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref