Preferred Language
Articles
/
thdWOI8BVTCNdQwCG2M8
The Arithmetic Coding and Hybrid Discrete Wavelet and Cosine Transform Approaches in Image Compression
...Show More Authors

Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurrence through the sub intervals between the range 0 and 1. Finally, the stream of compressed tables is reassembled for decompressing (image restoration). The results showed a compression gain of 10-12% and less time consumption when applying this type of coding to each block rather than the entire image. To improve the compression ratio, the second approach was used based on the YCbCr colour model. In this regard, images were decomposed into four sub-bands (low-low, high-low, low-high, and high-high) by using the discrete wavelet transform compression algorithm. Then, the low-low sub-band was transmuted to frequency components (low and high) via discrete wavelet transform. Next, these components were quantized by using scalar quantization and then scanning in a zigzag way. The compression ratio result is 15.1 to 27.5 for magnetic resonance imaging with a different peak signal to noise ratio and mean square error; 25 to 43 for X-ray images; 32 to 46 for computed tomography scan images; and 19 to 36 for magnetic resonance imaging brain images. The second approach showed an improved compression scheme compared to the first approach considering compression ratio, peak signal to noise ratio, and mean square error.

Crossref
View Publication
Publication Date
Thu Mar 03 2022
Journal Name
Multimedia Tools And Applications
Boosting Marine Predators Algorithm by Salp Swarm Algorithm for Multilevel Thresholding Image Segmentation
...Show More Authors

View Publication
Scopus (53)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Wed Oct 09 2024
Journal Name
Engineering, Technology & Applied Science Research
Improving Pre-trained CNN-LSTM Models for Image Captioning with Hyper-Parameter Optimization
...Show More Authors

The issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Loqmania commandments in the Koran And its impact in the refinement of the doctrine and morals emerging
...Show More Authors

Luqman's story stated that human instinct, if I was brought up properly, reaches wisdom and inflicts the right to everything. It is to go to worship God and adhere to the satisfaction of morals and high morals that are ordered to meet among human beings in this life, because this worship educates in the soul the most beautiful morals needed by human beings of honesty, honesty and modesty, and the work of good and virtues, and distancing the soul from evil and vices.

View Publication Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
The Self and the Other in the Dogmatic Discourse: The Cognitive and Emotional Structure of the Authoritarian and Destructive Personality
...Show More Authors

The philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Temptation and Intimidation in the Holy Quran and the Sunna And their Teaching – learning Perspectives
...Show More Authors

Methods of teaching plays an important vole in the educational process
because is the link between the teacher and the learner. The process of
teaching doesut fulfill the desirable results unless the methods of guiding and
teaching are provided and through a qualified educationalist capable of
communicating the syllabus to the students in an easy and clear way. In spite
of the diversity of the methods of teaching ,there is no one way suitable for all
the educational purposes , all the sciences ,all the subjects ,all the levels of
growth ,levels of teaching, maturity and intelligences ,all teachers and
educationalists and all the circum stances surrounding the teaching processes
.The teacher is the one who choos

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Laser
Experimental Study to The Effect of Applying Stressing Force on Etched Polarization Maintaining Fiber as Hybrid Fabry-Perot /Mach-Zehnder inline fiber interferometer
...Show More Authors

Abstract: The increased interest in developing new photonic devices that can support high data rates, high sensitivity and fast processing capabilities for all optical communications, motivates a pre stage pulse compressor research. The pre-stage research was based on cascading single mode fiber and polarization maintaining fiber to get pulse compression with compression factor of 1.105. The demand for obtaining more précised photonic devices; this work experimentally studied the behavior of Polarization maintaining fiber PMF that is sandwiched between two cascaded singe mode fiber SMF and fiber Bragg gratings FBG. Therefore; the introduced interferometer performed hybrid interference of both Mach-Zehnder

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Values and technology in architecture - the impact and vulnerability
...Show More Authors

Technology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.

In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete def

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Federal and problematic relationship between the center and the region in Iraq
...Show More Authors

The US invasion of Iraq in 2003 unleashed the repressed national aspirations of the Kurdish people. After the colonial powers, especially Britain, failed to establish a homeland of scattered Kurds in Iraq, Turkey, Syria and Iran, Iraq's Kurds managed to establish a semi-independent state in the north of the country Which lasted decades against the central authority in Baghdad in protest against what they call the forced integration of Kurds in the Iraqi state, and to obtain more rights and privileges as partners in this country. The federal region in the Kurdistan region of Iraq has become a reality, and it is eager not to strengthen its authority in return for the authority of the central government, but to annex other areas inhabited b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Industrial Policy and Development in Developing Countries (The Proponents and the Opponents
...Show More Authors

This paper aims to discuss and analyse the role and importance of implementing industrial Policy to promote industry and enhance economic development in developing countries. The paper discusses the economic justifications for using industrial policy as well as the criticisms leveled against it, for this purpose it analyses the ideas of two different approaches to industrial policy. The first held by the neo-liberals in the USA , who oppose the use of industrial policy and emphasise the role of the market in attaining economic development. The second, represented by many economists who support the use of industrial policy to promote industry and accelerate economic development, they justify their stand by pointing to the negative

... Show More
View Publication Preview PDF
Crossref (1)
Crossref