In this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.
This research aims to identify the impact of Daniel's model on the development of critical thinking. In order to achieve this objective, the following hypotheses are formulated: 1. There is no statistically significant difference at the significance level (0.05) between the average differences in the posttest scores of the experimental group taught according to Daniel's model and the control group taught according to the traditional method in the measure of critical thinking. 2. There is no statistically significant difference at the significance level (0.05) between the average differences in the preand post-tests scores of the experimental group taught according to Daniel's model in the measure of critical thinking. The current research i
... Show MoreAlmost all thermal systems utilize some type of heat exchanger. In a lot of cases, evaporators are important for systems like organic Rankine cycle systems. Evaporators give a share in a large portion of the capital cost, and their cost is significantly attached to their size or transfer area. Open-cell metal foams with high porosity are taken into consideration to enhance thermal performance without increase the size of heat exchangers. Numerous researchers have tried to find a representation of the temperature distribution closer to reality due to the different properties between the liquid and solid phases. Evaporation heat transfer in an annular pipe of double pipe heat exchanger (DPHEX) filled with cooper foam is investigated numerical
... Show MoreA strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreThe crude enzyme Nattokinase produced by Bacillus subtilis was used in ripening cheddar cheese by adding three concentration of enzyme 80, 160 and 320mg/Kg beside the control treatment without enzyme, the product was checked for three months to determine humidity, protein, fat, non-protein nitrogen, soluble nitrogen and pH, sensory evaluation was conducted, it was noticed that the variety in protein percentages and the soluble nitrogen percentage during second month of ripening for T2, T3 and T4 treatments were (11.2, 15.54 and 18.48) respectively, in comparison with control which was 7.6%, while in the third month it was (17.37, 20.67 and 22.26) respectively, in comparison with control which was only 10%, on the other hand, non-protein
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreConcealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant b
... Show MoreStrategies to reduce obesity have become main priority for many health institution and health staff around the world, as the prevalence of obesity has risen and exacerbated in most of the world mainly because of the modern life style which tend to be more sedentary with an increase eating unhealthy fast western food. Many years ago, the lipid-lowering drug simvastatin; and omega-3 were considered as a traditional lipid-lowering drug that have been well-documented to possess anti-inflammatory, cardioprotective and triglyceride-lowering properties; and their co-administration may demonstrate a complementary effect in lowering patients' triglycerides and total cholesterol to treat atherosclero
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreIn this paper, we study and investigate the quark anti-quark interaction mechanism through the annihilation process. The production of photons in association with interaction quark and gluon in the annihilation process. We investigate the effect of critical temperature, strength coupling and photons energy in terms of the quantum chromodynamics model theory framework. We find that the use of large critical temperature Tc =134 allows us to dramatically increase the strength coupling of quarks interaction. Its sensitivity to decreasing in photons rate with respect to strength coupling estimates. We also discuss the effect of photons energy on the rate of the photon , such as energies in range (1.5 to 5 GeV).The photons rate increases
... Show More