Preferred Language
Articles
/
bsj-1301
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Ain Shams Engineering Journal
Estimating server utilization rate in single server queuing models using an approximate solution of stiff fluid flow model
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Chemical Data Collections
Removal of an anionic Eosin dye from aqueous solution using modified activated carbon prepared from date palm fronds
...Show More Authors

View Publication
Scopus (30)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri May 15 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Assessment of Sagittal Condylar Position of TMJ Dysfunction in Centric Occlusion by Using Cone Beam Computed Tomography
...Show More Authors

Background: Temporomandibular joint (TMJ) is a compound articulation formed from the articular surfaces of the temporal bone and the mandibular condyle.CBCT imaging of TMJ is that it allows accurate measurements of the volume and surface of the condyle. The aim of the study is to assess the sagittal position of mandibular condyle in patients with temporomandibulardysfunction using Cone Beam Computed Tomography in centric occlusion. Materials and Methods: CBCT images for all patients were obtained in an upright position using New Tom Giano CBCT with different field of view (11 x 8), (11 x 5), and (8 x 8) and exposure factors was changed accordingly using NNT version 5.1 software for sagittal reconstruction, anterior, superior and posterior

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
الجامعة المستنصرية كلية الإدارة و الاقتصاد
The possibility of adoption of hybrid cloud computing in Iraqi universities : an analytical study using technology acceptance model
...Show More Authors

الناصر، عامر عبد الرزاق عبد المحسن والكبيسي، صلاح الدين عواد كريم. 2018. إمكانية تبني الحوسبة السحابية الهجينة في الجامعات العراقية : دراسة تحليلية باستخدام أنموذج القبول التكنولوجي. مجلة الإدا

View Publication Preview PDF
Publication Date
Thu Feb 29 2024
Journal Name
Iraqi Journal Of Science
Finding the Exact Solution of Kepler’s Equation for an Elliptical Satellite Orbit Using the First Kind Bessel Function
...Show More Authors

     In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Agronomy Journal
Use of Rainfall Data to Improve Ground-Based Active Optical Sensors Yield Estimates
...Show More Authors

Ground-based active optical sensors (GBAOS) have been successfully used in agriculture to predict crop yield potential (YP) early in the season and to improvise N rates for optimal crop yield. However, the models were found weak or inconsistent due to environmental variation especially rainfall. The objectives of the study were to evaluate if GBAOS could predict YP across multiple locations, soil types, cultivation systems, and rainfall differences. This study was carried from 2011 to 2013 on corn (Zea mays L.) in North Dakota, and in 2017 in potatoes in Maine. Six N rates were used on 50 sites in North Dakota and 12 N rates on two sites, one dryland and one irrigated, in Maine. Two active GBAOS used for this study were GreenSeeker and Holl

... Show More
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Ten Years of OpenStreetMap Project: Have We Addressed Data Quality Appropriately? – Review Paper
...Show More Authors

It has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlighting the diff

... Show More
Crossref (3)
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Alustath Journal For Human And Social Sciences
A Developmental-Longitudinal Study of Request External Modifiers in Authentic and Elicited Data
...Show More Authors

View Publication
Crossref