<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on an adaptive, error bounded coding system, and it uses the DCT compression scheme. The performance of the developed compression system was analyzed and compared with those attained from the universal standard JPEG, and the results of applying the proposed system indicated its performance is comparable or better than that of the JPEG standards.</p>
Background: Anemia is a serious global public health problem that particularly affects pregnant women.
Objectives: The objectives of the study were to find out the prevalence of anemia and its associated risk factors among supplemented and non-supplemented pregnant women.
Cases and methods: Six hundred and forty-one blood samples were collected through simple random sampling from pregnant women and controls. The collected data from the participants included age, education, residence, and obstetrical related factors, and blood samples were taken for blood tests.
Results: One hundred and sixty-four (74.2%) and 73 (34.9%) of non-supplemented and supp
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThe present study aimed to look for the differences in the oxidative stress status in sera and saliva samples of type 2 diabetic Iraqi patients with and without proliferative diabetic retinopathy. As well as to look for the possibility whether this status can be measured in saliva as an alternative sample to that of serum, hence to achieve that total oxidant status, total antioxidant status and oxidative stress index were measured in both sera and saliva samples of two groups of patients with type 2 diabetes mellitus and the healthy individuals. Upon the comparison between patients without proliferative diabetic retinopathy and the control sample the results showed presence of a significant increase (p < 0.05) of total oxidant st
... Show MoreThe ground state density distributions and electron scattering Coulomb form factors of Helium (4,6,8He) and Phosphorate (27,31P) isotopes are investigated in the framework of nuclear shell model. For stable (4He) and (31P) nuclei, the core and valence parts are studied through Harmonic-oscillator (HO) and Hulthen potentials. Correspondingly, for exotic (6,8He) and (27P) nuclei, the HO potential is applied to the core parts only, while the Hulthen potential is applied to valence parts. The parameters for HO and Hulthen are chosen to reproduce the available experimental size radii for all nuclei under study. Finally, the CO component of electron scattering charge fo
... Show MoreThe State Legislative Council practices its consultative specialization through issuing the fatwasand legal opinions for the ministries and the institutions which are not associated with a ministry, The Advisory Commissions with each of General Commission, Presidency Commission and The Specialized Commission take charge of this mission.
Where the abovementioned Advisory Commissions practice different jurisdictions in codification field, giving legal opinion field and legal advisory.
The State Legislative Council through its Advisory specialization could provide a protection for the rights and general freedomswhere it contributed in protecting the rights and personal freedoms through issuing the fatwas that dictatesto that
... Show MoreThis study deals with microfacies analysis, diagenetic facies, environmental interpretations related to sequence stratigraphy for Early – Middle Miocene in selected wells within Balad (Ba-X) and East Baghdad (EB-Z) oil fields.
Seven major microfacies were recognized in the successions of the study wells, these facies were used to recognize six facies association (depositional environments) within the study oil fields: deep marine, toe of slope, open marine, restricted interior platform, evaporitic interior platform and brackish interior platform. The facies associations interpreted were based on texture and obtainable fauna.
The Early - Middle Miocene succession was deposited during two depositional cycles as a t
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More