Preferred Language
Articles
/
ijp-361
Adaptive inter frame compression using image segmented technique
...Show More Authors

The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.

           Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit, the research modifies a method for video image data compression based on the two-component code; in this coding technique, the video image is partitioned into regions of slowly varying intensity. The contours separating the regions are coded by DCT, while the rest image regions are coded by Block-Truncation Coding. this hybrid coding technique called segmented image coding (SIC). Also in this paper A modify of the four step search for motion Estimation technique was produce. for searching scheme has been introduced which is contributed in decreasing  the motion estimation  searching time of the successive inter frames.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
3-D OBJECT RECOGNITION USING MULTI-WAVELET AND NEURAL NETWORK
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 01 2025
Journal Name
Journal Of Engineering
Transient Response Investigation of Cross-Ply Plates Using Refined Theory
...Show More Authors

Response of cross-ply plates subjected to transient load is obtained using five variables refined plate theory, and four variables plate theory. Equations of motion are derived through the principleof virtual work. Navier series used for simply supported laminated plates. The results of this work are presented for different parameters, such as the ply number, thickness, and modulus ratio with mechanical load (sinusoidal and step pulses), which are compared with those obtained using high-order shear plate theory. Five variables of refined plate theory give results that are considerably different from the four variables of refined plate theory and higher-order theory. The obtained results from the four variables theory have the same behavior

... Show More
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
The link of destination Using the evidence Analytical Fundamental Study
...Show More Authors

This paper seeks to study the link between the fundamentalist evidence based on the observance of governance and interests and the ranks of the three legitimate purposes (necessary, need and detailed). The researcher followed the descriptive-analytical approach. The study reached important results, including that the measurement relates to the three ranks, but predominantly attached to measure the meaning of the need and the need, and the measurement of the semi-formal and semi-predominance improvement. Reclamation is considered by the majority of scholars to be authentic if it is related to the necessity and the need, and that it is not acceptable to improve only by a witness who recommends it. The excuses relate to Hajji and Tahini, no

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Engineering
DEWAXING OF DISTILLATE OIL FRACTION (400- 500 ºC) USING UREA
...Show More Authors

De-waxing of lubricating oil distillate (400-500 ºC) by using urea was investigated in the present study. Lubricating oil distillate produced by vacuum distillation and refined by furfural extraction was taken from Al-Daura refinery. This oil distillate has a pour point of 34 ºC. Two solvents were used to dilute the oil distillate, these are methyl isobutyl ketone and methylene chloride. The operating conditions of the urea adduct formation with n-paraffins in the presence of methyl isobutyl ketone were studied in details, these are solvent to oil volume ratio within the range of 0 to 2, mixer speed 0 to 2000 rpm, urea to wax weight ratio 0 to 6.3, time of adduction 0 to 71 min and temperature 30-70 ºC). Pour point of de-waxed oil and yi

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Preparation of polymer thin film using as NH3 gas Sensor
...Show More Authors

Polyaniline organic Semiconductor polymer thin films have been prepared by oxidative polymerization at room temperature, this polymer was deposited on glass substrate with thickness 900nm, FTIR spectra was tested , the structural,optical and electrical properties were studied through XRD ,UV-Vis ,IR measurements ,the results was appeared that polymer thin film sensing to NH3 gas.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 07 2025
Journal Name
Al-nahrain Journal For Engineering Sciences
Design of Reverse Osmosis Water Treatment Unit Using Lanxess Lewaplus2
...Show More Authors

Basrah is the richest town and the economic capital of Iraq. It suffers from lack of drinking water. This project is a dream to supply drinking water to Basrah citizens within WHO standards. Water should pass sedimentation and filtration stages before interring reverse osmosis unit. The design is carried out using lewaplus2 software. Several parameters should be selected in the design step membrane type, number of stages, number per element in each stage, and the recovery percentage. An optimization is carried out using Minitab ver. 18 for the acceptable limit of TDS and minimum cost and it was found that the optimum conditions were 52% for first stage, the numbers of vessels are 20 for both the first and second stage. In addition,

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Numerical Simulation of Ice Melting Using the Finite Volume Method
...Show More Authors

The Aim of this paper is to investigate numerically the simulation of ice melting in one and two dimension using the cell-centered finite volume method. The mathematical model is based on the heat conduction equation associated with a fixed grid, latent heat source approach. The fully implicit time scheme is selected to represent the time discretization. The ice conductivity is chosen
to be the value of the approximated conductivity at the interface between adjacent ice and water control volumes. The predicted temperature distribution, percentage melt fraction, interface location and its velocity is compared with those obtained from the exact analytical solution. A good agreement is obtained when comparing the numerical results of one

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Decisions making for fraction functions By Using Goal Programming Method
...Show More Authors

Decision making is vital and important activity in field operations research ,engineering ,administration science and economic science with any industrial or service company or organization because the core of management process as well as improve him performance . The research includes decision making process when the objective function is fraction function and solve models fraction programming by using some fraction programming methods and using goal programming method aid programming ( win QSB )and the results explain the effect use the goal programming method in decision making process when the objective function is
fraction .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref