In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression.
New complexes of the type [ML2(H2O)2] ,[FeL2(H2O)Cl] and [VOL2] were M=Co(II),Ni(II) and Cu(II) ,L=4-(2-methyl-4-oxoquinazoline-3(4H)-yl) benzoic acid were synthesized and characterized by element analysis, magnetic susceptibility ,molar conductance ,FT-IR and UV-visible. The studies indicate that the L acts as doubly monodentate bridge for metal ions and form mononuclear complexes. The complexes are found to be octahedral except V(IV) complex is square pyrimde shape . The structural geometries of compounds were also suggested in gas phase by theoretical treatments, using Hyper chem-6 program for the molecular mechanics and semi-empirical calculations, addition heat of formation(?Hf ?) and binding energy (?Eb)for the free ligan
... Show MoreNew azo ligand 2-((4-formyl-3-hydroxynaphthalen-2-yl) diazenyl) benzoic acid (H2L) was synthesized from the reaction of 2-aminobenzoic acid and2-hydroxy-1-naphthaldehyde. Monomeric complexes of this ligand, of general formulae [MII(L)(H2O)] with (MII = Mn, Co, Ni, Cu, Zn, Pd, Cd and Hg ) were reported. The compounds were isolated and characterized in solid state by using 1H-NMR, FT-IR, UV–Vis and mass spectral studies, elemental microanalysis, metal content, magnetic moment measurements, molar conductance and chloride containing. These studies revealed tetrahedral geometries for all complexes except PdII complex is Square planar. The study of complexes formation via molar ratio of (M:L) as (1:1). Theoretical treatments of compounds in gas
... Show MoreThis research deals with the design and simulation of a solar power system consisting of a KC200GT solar panel, a closed loop boost converter and a three phase inverter by using Matlab / Simulink. The mathematical equations of the solar panel design are presented. The electrical characteristics of the panel are tested at the values of 1000 for light radiation and 25 °C for temperature environment. The Proportional Integral (PI) controller is connected as feedback with the Boost converter to obtain a stable output voltage by reducing the oscillations in the voltage to charge a battery connected to the output of the converter. Two methods (Particle Swarm Optimization (PSO) and Zeigler- Nichols) are used for tuning
... Show MoreThe Ligand 6,6--(1,2-benzenediazo) bis (3-aminobenzoicacid) derived from o-phenylenediamine and 3-aminobenzoicacid was synthesized. The prepared ligand was identified by Microelemental Analysis, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Treatment of the ligand with the following metal ions (CoII, NiII, CuII and ZnII ) in aqueous ethanol with a 1:1 M:L ratio and at optimum pH. Characterization of these compounds has been done on the basis of elemental analysis, electronic data, FT-IR and UV-Vis, as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1×10-4 - 3×10-4 M). H
... Show MoreIn the current study, a direct method was used to create a new series of charge-transfer complexes of chemicals. In a good yield, new charge-transfer complexes were produced when different quinones reacted with acetonitrile as solvent in a 1:1 mole ratio with N-phenyl-3,4-selenadiazo benzophenone imine. By using analysis techniques like UV, IR, and 1H, 13C-NMR, every substance was recognized. The analysis's results matched the chemical structures proposed for the synthesized substances. Functional theory of density (DFT)
has been used to analyze the molecular structure of the produced Charge-Transfer Complexes, and the energy gap, HOMO surfaces, and LUMO surfaces have all been created throughout the geometry optimization process ut
Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More