Preferred Language
Articles
/
sheWKY4BVTCNdQwCzzud
Terrestrial Laser Scanning to Preserve Cultural Heritage in Iraq Using Monitoring Techniques
...Show More Authors

English

View Publication
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Tue Oct 12 2021
Journal Name
Engineering, Technology And Applied Science Research
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit

... Show More
Scopus (29)
Crossref (25)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Defect Detection Using Thermography Camera Techniques: A review
...Show More Authors

Individuals across different industries, including but not limited to agriculture, drones, pharmaceuticals and manufacturing, are increasingly using thermal cameras to achieve various safety and security goals. This widespread adoption is made possible by advancements in thermal imaging sensor technology. The current literature provides an in-depth exploration of thermography camera applications for detecting faults in sectors such as fire protection, manufacturing, aerospace, automotive, non-destructive testing and structural material industries. The current discussion builds on previous studies, emphasising the effectiveness of thermography cameras in distinguishing undetectable defects by the human eye. Various methods for defect

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
New techniques to estimate the solution of autonomous system
...Show More Authors

This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 13 2011
Journal Name
Iraqi Journal Of Laser
Liver Repair in Rabbits Using 532 nm Nd:YAG Laser; In Vivo Study
...Show More Authors

The main goal of this in vivo study was to evaluate the effect of 532nm Q-switched Nd: YAG Laser in combination with Human Serum Albumin 20% concentration (as a welding aid) on the liver tissue repair clinically, and histologically. The animals used in this study were 21 male rabbits divided into three main groups: control group (3 rabbits), conventionally treated group (9 rabbits) and Laser treated group (9 rabbits). Each two main groups (conventional and laser treated) consist of three sub-groups depending on the response evaluation at three different periods. The Laser group was treated using 532nm Q-switched Nd: YAG laser after adding human serum albumin immediately on the incised liver’s tissue. The energy of was 460mJ, and 4Hz fr

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Monitoring of Evaporated Cooling Tower
...Show More Authors

Thep resent study was conducted for monitoring of the evaporative cooling tower in methanol production plant using digital computer' visuql Basic computer program was used for the monitoring of the performance of the cooling tower. The structure program consists of sub programs and forms to show all the related variabltes such as temperature, flow rate, pressure ...etc, that affect the cooling tower operation and give alarms and important function informition regarding these variables.

View Publication Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (136)
Crossref (126)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Characteristics of probing electrons behavior inside the chamber of scanning electron microscope
...Show More Authors
Abstract<p>The electron mirror phenomenon has been explored to describe the behavior of a probing electron trajectory inside the chamber of scanning electron microscope (SEM). This investigation has been carried out by means of the modulated mirror plot curve technique. This method is based on expanding sample potential to a multipolar form to detect the actual distribution of the trapped charges. Actually an experimental result is used to guiding results of this work toward the accurate side. Results have shown that the influence of each type of multipolar arrangement (monopole, dipole, quadruple, octopole … etc.) mainly depends on the driving potential.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 21 2024
Journal Name
Edelweiss Applied Science And Technology
Using count regression models to investigate the most important economic factors affecting divorce in Iraq
...Show More Authors

The two most popular models inwell-known count regression models are Poisson and negative binomial regression models. Poisson regression is a generalized linear model form of regression analysis used to model count data and contingency tables. Poisson regression assumes the response variable Y has a Poisson distribution, and assumes the logarithm of its expected value can be modeled by a linear combination of unknown parameters. Negative binomial regression is similar to regular multiple regression except that the dependent (Y) variables an observed count that follows the negative binomial distribution. This research studies some factors affecting divorce using Poisson and negative binomial regression models. The factors are unemplo

... Show More
View Publication
Scopus Crossref