<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on an adaptive, error bounded coding system, and it uses the DCT compression scheme. The performance of the developed compression system was analyzed and compared with those attained from the universal standard JPEG, and the results of applying the proposed system indicated its performance is comparable or better than that of the JPEG standards.</p>
The major climate changes that have affected the planet in addition to wave the big drought plaguing the study area, including the lack of water for imports Badra River fatigue because of the Iran constructing dams on this river and make use of the waters for the benefitof its territory. The subject of finding sources of water has become available with the possibility of exploiting them in an exemplary manner is one of the key things in order to be exploited somewhere.
The study area was chosen within the eastern border of the province of Wasit within the district of Badra border, an area of (1557.5 km2) almost "to study the characteristics of hydrological and identify possibilities for water harvesting them. In this study was conduct
Paul Auster's City of Glass is here singled out as representative of the writer's The New
York Trilogy. All throughout his novelistic career, Auster has been working on a pseudothesis
that adheres to a certain aesthetic of disappearance. The study engages this Austerian
aesthetic apropos of certain theoretical stretches such as the Emersonian "Not Me", the
Thoreauvian "interval" or "nowhere", the Deleuzian "nomadic trajectory", the Derridian
"grammè" or "specter", and the Baudrillardian "disappearance". The city of the novel's titling
is here seen as the trope of all that which has already disappeared, and hence it is seen as the
space (mise en scène) where the perfect crime of the murder of the real is to be thoro
The laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreIn this work, we are obviously interested in a general solution for the calculation of the image of a single bar in partially coherent illumination. The solution is based on the theory of Hopkins for the formation of images in optical instruments in which it was shown that for all practical cases, the illumination of the object may be considered as due to a self – luminous source placed at the exit pupil of the condenser , and the diffraction integral describing the intensity distribution in the image of a single bar – as an object with half – width (U0 = 8 ) and circular aperture geometry is viewed , which by suitable choice of the coherence parameters (S=0.25,1.0.4.0) can be fitted to the observed distribution in various types of mi
... Show MoreBACKGROUND: Color Vision Deficiency (CVD) is mostly an inherited trait and is not an uncommon problem. Prevalence of CVD differs among different ethnic and geographic properties of the population that affect their genetic constitution. Ishihara plates remain an internationally accepted tool for screening red-green CVD. OBJECTIVE: To determine the prevalence of red-green CVD among adult males from Baghdad province. PATIENTS AND METHODS: One thousand and five (1005) adult males were enrolled in this study, using a systematic sampling technique, and were screened for CVD utilizing 24-plate Ishihara plates and re-tested by EnChroma 39-Color plates. All males were residing in Baghdad and the center of Iraq. RESULTS: Among all tested males, 948 r
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More