In this paper, wavelets were used to study the multivariate fractional Brownian motion through the deviations of the random process to find an efficient estimation of Hurst exponent. The results of simulations experiments were shown that the performance of the proposed estimator was efficient. The estimation process was made by taking advantage of the detail coefficients stationarity from the wavelet transform, as the variance of this coefficient showed the power-low behavior. We use two wavelet filters (Haar and db5) to manage minimizing the mean square error of the model.
The aim of this paper is to estimate a single reliability system (R = P, Z > W) with a strength Z subjected to a stress W in a stress-strength model that follows a power Rayleigh distribution. It proposes, generates and examines eight methods and techniques for estimating distribution parameters and reliability functions. These methods are the maximum likelihood estimation(MLE), the exact moment estimation (EMME), the percentile estimation (PE), the least-squares estimation (LSE), the weighted least squares estimation (WLSE) and three shrinkage estimation methods (sh1) (sh2) (sh3). We also use the mean square error (MSE) Bias and the mean absolute percentage error (MAPE) to compare the estimation methods. Both theoretical c
... Show MoreBackground: Atrophic postoperative and traumatic scarring are common cosmetic problems for patients. Combining CO2 laser ablation with a fractional photothermolysis system in a treatment known as ablative fractional resurfacing fulfilling the new demands for a lesser risk of side effects and minimal or no downtime.Objective: To assess the safety and efficacy of ablation fractional CO2 laser treatments for surgical scarring .methods: Twenty one patient ( 14 women, and 7 men ) with various skin types , I to IV , aged 3 to 48 years , presents with 24 scars between June and December 2012 , four patients excluded from study because they are not continued in follow up , the remaining 17 patient completed all 3 treatments & 6 months follow
... Show MoreTwo different approaches, univariate and multivariate (simplex method), have been used to obtain the optimum conditions for the quantitative Spectrophotometric determination of Eu3+ using Solochrome violet RS (3-Hydroxy-4-(2-hydroxy phenyl azo) naphthalene -1sulfonic acid) (SVRS) as a chromogenic reagent. The investigation shows that Eu3+ ion forms a wine-red complex with SVRS in alkaline buffer solution having a maximum absorbance at 464 nm against reagent blank. Calibration graphs obtained under univariate and simplex were found to be linear in the range of (0.30-8.0) µg/ml with detection limit 0.061µg/ml and molar absorptivity of 9877.66 L/mol.cm and (0.40-10.0)µg/ml with
... Show MoreIn the present research, the nuclear deformation of the Ne, Mg, Si, S, Ar, and Kr even–even isotopes has been investigated within the framework of Hartree–Fock–Bogoliubov method and SLy4 Skyrme parameterization. In particular, the deform shapes of the effect of nucleons collective motion by coupling between the single-particle motion and the potential surface have been studied. Furthermore, binding energy, the single-particle nuclear density distributions, the corresponding nuclear radii, and quadrupole deformation parameter have been also calculated and compared with the available experimental data. From the outcome of our investigation, it is possible to conclude that the deforming effects cannot be neglected in a characterization o
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreFingerprint recognition is one among oldest procedures of identification. An important step in automatic fingerprint matching is to mechanically and dependably extract features. The quality of the input fingerprint image has a major impact on the performance of a feature extraction algorithm. The target of this paper is to present a fingerprint recognition technique that utilizes local features for fingerprint representation and matching. The adopted local features have determined: (i) the energy of Haar wavelet subbands, (ii) the normalized of Haar wavelet subbands. Experiments have been made on three completely different sets of features which are used when partitioning the fingerprint into overlapped blocks. Experiments are conducted on
... Show MoreIn this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.
The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset f
... Show MoreIn this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s