Preferred Language
Articles
/
jpd-192
Estimating Water Quality from Satellite Image and Reflectance Data
...Show More Authors

The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Nasaq Journal
The Demonic Image of Autoimmunity in Dan Brown's Angels and Demons
...Show More Authors

Autoimmunity is a philosophical term that enhances the fields of life-sciences, and links out to the unnatural behaviour of an individual. It is caused by the defenses of an organism that deceive its own tissues. Obviously, the immune system should protect the body against invading cells with types of white blood cells called antibodies. Nevertheless, when an autoimmune disease attacks, it causes perilous actions like suicide. Psychologically, Jacques Derrida (1930-2004) calls autoimmunity a double suicide, because it harms the self and the other. In this case, the organ disarms betraying cells, as the immune system cannot provide protection. From a literary perspective, Derrida has called autoimmunity as deconstruction for over forty years

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The Compact city and urban image of the traditional city center
...Show More Authors
Abstract<p>The traditional city suffers from the decline of the urban image due to urban development and homogeneity with the urban context of the city, and because of the lack of determinants governing the urban image, it is that the center of the city of traditional Kadhimiya suffers from a break in the urban image, Therefore, the research included how to build a distinctive urban image of the center of the traditional city of Kadhimiya and achieve the visual pleasure and comfort of the recipient and the urban image here means is an image not picture which are related to several aspects, including physical, social and psychological as well as the collective memory of individuals and their rela</p> ... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Sat Jul 01 2017
Journal Name
Diyala Journal For Pure Science
Correlated Hierarchical Autoregressive Models Image Compression
...Show More Authors

View Publication
Crossref