Preferred Language
Articles
/
ijp-733
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance Study of Electrodialysis for Treatment Fuel Washing Wastewater
...Show More Authors

In this work, electrodialysis (ED) has been demonstrated to be appropriate technique for reducing the electrical conductivity of real wastewater from fuel washing unit, which has been previously treated by other electrochemical technology (electrocoagulation and electrooxidation).  A five cell electrodialysis stack, with an active membrane area of 60 cm2 per cell was employed. During a batch recirculation mode ED system, the effects of parameters such as electrical potential applied (6-18 V) and flow rate of streams (0.5-1.7 L/min.) on the performance of the total dissolved solids (TDS) separation and specific power consumption (SPC) were studied. The results indicate that the process of ED under potential (15 V) and flow

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Heterogeneous Photocatalytic Degradation for Treatment of Oil from Wastewater
...Show More Authors

In the present study, advanced oxidation process / heterogeneous photocatalytic process (UV/TiO2/Fenton) system was investigated to the treatment of oily wastewater. The present study was conducted to evaluate the effect of hydrogen peroxide concentration H2O2, initial amount of the iron catalyst Fe+2, pH, temperature, amount of TiO2 and the concentration of oil in the wastewater.  The removal efficiency for the system UV/TiO2/Fenton at optimal conditions and dosage (H2O2 = 400mg/L, Fe+2 = 40mg/L, pH=5, temperature =30oC, TiO2=75mg/L) for 1000mg/L load was found to be 77%.

Aluminum foil cover around the re

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sun Jul 23 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Future of Engineered Phage Therapy for Clostridium difficile Infections
...Show More Authors

Bacteriophages have the potential to eliminate both antibiotic-resistant and sensitive bacteria; as a result, they have become a major focus of such research. In contrast to antibiotics, which assault the entire bacterial population without discrimination, bacteriophages have a limited set of characteristics that allow them to target infectious microbes while avoiding friendly species (commensal microbiota). Nevertheless, large groups of naturally occurring bacteriophages that are well-differentiated and selective for the most clinically recognized pathogenic bacterial strains are required. Utilizing genetic engineering techniques that modify the target phage genome to synthesize phages with known characteristics in a brief period o

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Wed Aug 10 2022
Journal Name
Mathematical Statistician And Engineering Applications
Results for the Groups SL(2,34 ) and SL(2,36 )
...Show More Authors

Publication Date
Sat Oct 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
Illation for the Groups SL(2,112 ) and SL(2,132 )
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Enforcement for the groups SL(2,125) and SL(2,3125)
...Show More Authors

The group for the multiplication of closets is the set G|N of all closets of N in G, if G is a group and N is a normal subgroup of G. The term “G by N factor group” describes this set. In the quotient group G|N, N is the identity element. In this paper, we procure K(SL(2,125)) and K(SL(2,3125)) from the character table of rational representations for each group.

View Publication
Scopus (11)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref