Preferred Language
Articles
/
bsj-1300
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V color space information giving the approximate and the detail coefficients. The detail coefficients are quantized, coded using run length encoding (RLE) and SRLE. The approximate coefficients were coded using DCT, since DCT has superior compression performance when image information has poor power concentration in high frequency areas. This output is also quantized, coded using RLE and SRLE. Test results showed that the proposed DWT DCT SRLE system proved to have encouraging results in terms of Peak Signal-to-Noise Ratio (PSNR), Compression Factor (CF) and execution time when compared with some DWT based image compressions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Separation of Bovine Serum Albumin Using Chromatographical Column: Parameters and Simulation
...Show More Authors

A liquid-solid chromatography of Bovine Serum Albumin (BSA) on (diethylaminoethyl-cellulose) DEAE-cellulose adsorbent is worked experimentally, to study the effect of changing the influent concentration of (0.125, 0.25, 0.5, and 1 mg/ml) at constant volumetric flow rate Q=1ml/min. And the effect of changing the volumetric flow rate (1, 3, 5, and 10 ml/min) at constant influent concentration of Co=0.125mg/ml. By using a glass column of (1.5cm) I.D and (50cm) length, packed with adsorbent of DEAE-cellulose of height (7cm). The influent is introduced in to the column using peristaltic pump and the effluent concentration is investigated using UV-spectrophotometer at 30oC and 280nm wavelength. A spread (steeper) break-through curve is gained

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (21)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Artificial Intelligence and Trends Using in Sustainability Audit: A Bibliometric Analysis
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Tissue Welding Using (800±10nm) Diode and (1064nm) Nd: YAG Lasers
...Show More Authors

Joining tissue is a growing problem in surgery with the advancement of the technology and more precise and difficult surgeries are done. Tissue welding using laser is a promising technique that might help in more advancement of the surgical practice. Objectives: To study the ability of laser in joining tissues and the optimum parameters for yielding good welding of tissues. Methods: An in-vitro study, done at the Institute of Laser, Baghdad University during the period from October 2008 to February 2009. Diode and Nd-YAG lasers were applied, using different sessions, on sheep small intestine with or without solder to obtain welding of a 2-mm length full thickness incision. Different powers and energies were used to get maximum effect. Re

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oily Wastewater Treatment Using Expanded Beds of Activated Carbon and Zeolite
...Show More Authors

Two types of adsorbents were used to treat oily wastewater, activated carbon and zeolite. The removal efficiencies of these materials were compared to each other. The results showed that activated carbon performed some better properties in removal of oil. The experimental methods which were employed in this investigation included batch and column studies. The former was used to evaluate the rate and equilibrium of carbon and zeolie adsorption, while the latter was used to determine treatment efficiencies and performance characteristics. Expanded bed adsorber was constructed in the column studies. In this study, the adsorption behavior of vegetable oil (corn oil) onto activated carbon and zeolite was examined as a function of the concentr

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
DESIGN AND IMPLEMENTATION AN IRAQI CITIES DATABASE USING K-D TREE
...Show More Authors

This research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).

View Publication Preview PDF