Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
The influence of fiber orientation and water absorption on fatigue crack growth resistance for cold cure acrylic (PMMA) reinforced by chopped and woven -glass-fibers were investigated. A weight of 2 g for chopped fibers and the same weight for woven -glass-fibers (one layer) were used to prepare samples. Some of these samples would storage in dry condition; the others were immersed in water for 15 days. Fatigue test was carried out. The results shows that, for PMMA, the initial bending stress for dry specimen was 3.392 N/cm2 and the number of cycles were 1364, the initial bending stress for wet samples was 4.20 N/cm2, and the number of cycles was 2411. The samples would cut in two pieces because of the cracks would propagated fast during
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreA simple, accurate and rapid method for separation and determination of most commonly usedinsecticides in Iraq [thiamethoxam (Thi), imidacloprid (Imi), indoxacarb (Ind), and abamectin (Aba)] ispresented. The separation was performed by gradient reversed-phase high performance liquidchromatography on a C18 stationary phase column. The method was developed and validated. The-1mobile phase was a mixture of acetonitrile and water using gradient flow. The flow rate was 1.0 mL min .The optimum temperature of separation was 25 ºC. The detection was performed at multiple wavelengths.The analysis time was up to 10.5 minutes with retention times of 3.221, 3.854, 6.385, and 9.452 min for-1the studied insecticides. The linearity was in the range of 0.
... Show MoreIn petroleum industry, the early knowledge of “pore pressure gradient” is the basis in well design and the extraction of these information is more direct when the pore pressure gradient is equal to normal gradient; however, this matter will be more complex if it deviate from that limit which is called “abnormal pore pressure”, if this variable does not put in consideration, then many drilling problems will occur might lead to entire hole loss. To estimate the pore pressure gradient there are several methods, in this study; Eaton method’s is selected to extract the underground pressure program using drilling data (normalized rate of penetration) and logs data (sonic and density log). The results shows that an abnormal high press
... Show MoreEmpirical equation has been presented to predict the optimum hydrodynamic
pressure gradient with optimum mud flow rate (one equation) of five Iraqi oil wells
to obtain the optimum carrying capacity of the drilling fluid ( optimum transport
cuttings from the hole to the surface through the annulus).
This equation is a function of mud flow rate, mud density and penetration
rate without using any charts or graphs.
The correlation coefficient accuracy is more than 0.9999.