Preferred Language
Articles
/
rhdSOI8BVTCNdQwCEGNZ
Hybrid DWT-DCT compression algorithm & a new flipping block with an adaptive RLE method for high medical image compression ratio
...Show More Authors

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zigzag scan is applied on the quantized coefficients and the output are encoded using DPCM, shift optimizer and shift coding for DC while adaptive RLE, shift optimizer then shift coding applied for AC, the other subbands; LH, HL and HH are compressed using the scalar quantization, Quadtree and shift optimizer then shift coding. In this paper, a new flipping block with an adaptive RLE is proposed and applied for image enhancement. After applying DCT system and scalar quantization, huge number of zeros produced with less number of other values, so an adaptive RLE is used to encode this RUN of zeros which results with more compression.Standard medical images are selected to be used as testing image materials such as CT-Scan, X-Ray, MRI these images are specially used for researches as a testing samples. The results showed high compression ratio with high quality reconstructed images  

Crossref
View Publication
Publication Date
Mon Oct 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Robot Path Planning in Unknown Environments with Multi-Objectives Using an Improved COOT Optimization Algorithm
...Show More Authors

Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Design of an Adaptive PID Neural Controller for Continuous Stirred Tank Reactor based on Particle Swarm Optimization
...Show More Authors

 A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.

View Publication Preview PDF
Publication Date
Fri Jul 02 1999
Journal Name
Iraqi Journal Of Science
A new proposal method for sampling and explosion of the phosphatic rocks in the Akkashat Mine, Western desert, Iraq
...Show More Authors

Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
On modelling and adaptive control of a linear smart beam model interacting with fluid
...Show More Authors
Abstract<p>This paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi</p> ... Show More
View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
BUILD AN EFFICIENT INVESTMENT PORTFOLIO USING THE WILLIAM RATIO (EMPIRICAL STUDY) IN IRAQ STOCK EXCHANGE: BUILD AN EFFICIENT INVESTMENT PORTFOLIO USING THE WILLIAM RATIO (EMPIRICAL STUDY) IN IRAQ STOCK EXCHANGE
...Show More Authors

ABSTRACT

            This study aimed to choose top stocks through technical analysis tools specially the indicator called (ratio of William index), and test the ability of technical analysis tools in building a portfolio of shares efficient in comparison with the market portfolio. These one technical tools were used for building one portfolios in 21 companies on specific preview conditions and choose 10 companies for the period from (March 2015) to (June 2017). Applied results of the research showed that Portfolio yield for companies selected according to the ratio of William index indicator (0.0406) that

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Solving Whitham-Broer-Kaup-Like Equations Numerically by using Hybrid Differential Transform Method and Finite Differences Method
...Show More Authors

This paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Aug 21 2022
Journal Name
International Journal Of Health Sciences
Molecular detection of fimH&amp; mrkDgenes of strong biofilm producers &amp; MDR Klebsiella pneumoniae
...Show More Authors

Klebsiella pneumoniae is an adaptable pathogen that forms biofilms on a variety of surfaces. This study's objective was to identify the presence of fimbrial genes (types 1 and 3) in K. pneumoniae strains isolated from various clinical sources based on their antibiotic resistance and ability to form biofilms. According to identification utilizing the vitek 2 technology and confirmation by molecular identification targeting the 16S rRNA gene with a particular primer, forty isolates were identified from clinical specimens. The vitek 2 compact system was utilized to evaluate the antibiotic susceptibility of all the isolates. The findings revealed a range of resistance percentages, including 52.5% for Penicillin, 40.5% for Trimethoprim/S

... Show More
View Publication
Crossref