Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used to perform a comparative analysis of the performance of the whole system. Several image test samples were used to test the performance behavior. The simulation results show the efficiency of these combined transformations when LZW is used in the field of data compression. Compression outcomes are encouraging and display a significant reduction in image file size at good resolution.
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show More<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe purpose of this study is to illuminate the role of CBCT in forensic dentistry through variations of mandibular measurements of Bonwill’s triangles in gender determination among the Iraqi population.
In this retrospective study 70 CBCT scans were analyzed to measure the Bonwill’s triangle, 35 for males and 35 for females aged between 20 and 50 years, all data were collected at the oral and maxillofacial radiology department in Ghazi AL-Hariri hospital for 3 months, and the data were obtained using a Kavo CBCT device (3D On De
The laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2
Most vegetation’s are Land cover (LC) for the globe, and there is an increased attention to plants since they represent an element of balance to natural ecology and maintain the natural balance of rapid changes due to systematic and random human uses, including the subject of the current study (Bassia eriophora ) Which represent an essential part of the United Nations system for land cover classification (LCCS), developed by the World Food Organization (FAO) and the world Organization for environmental program (UNEP), to observe basic environmental elements with modern techniques. Although this plant is distributed all over Iraq, we found that this plant exists primarily in the middle
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreLaser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte
Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria. Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core. Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um
... Show More