JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
Efficient cuttings transport and hole cleaning are very important factors for obtaining an effective drilling operation. In an inclined and horizontal drilling, hole cleaning issue is a common and complex problem.
The scope of this research is to study the drilling parameters which affect hole cleaning in Iraqi directional wells through studying and analyzing some drilled wells ( vertical , directional (30 degree) , directional (60 degree) and horizontal ).An excel sheet is prepared to calculate carrying capacity index which represents an indicator for good hole cleaning in different sections. The study indicated through the field investigations, practical experiences and theoretical calculations tha
... Show MoreTo maintain river flows necessary to meet social and ecological objectives, instream environmental flows are frequently used as a strategy. The capability of three alternative historical flow approaches to protect against low flows is shown in this study using gage stations in the Shatt Al-Hillah River in Iraq. The extension of the Shatt al-Hillah River is the focus of this research discussion on environmental flow assessment. The available data on discharge in this research were adopted for ten years from 2012-2021. Different flow methods were adopted to establish a minimum environmental flow in the Shatt Al-Hillah River. Three hydrological-based approaches: Tennant, modified Tennant, and low-flow metrics like 7Q10, wer
... Show MoreTechnology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.
In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete def
... Show MoreFlexible pavement design and analysis were carried out in the past with semi-experimental methods, using elastic characteristics of pavement layers. Due to the complex interferences between various layers and their time consumption, the traditional pavement analysis, and design methods were replaced with fast and powerful methods including the Finite Element Method (FEM) and the Discrete Element Method (DEM). FEM requires less computational power and is more appropriate for continuous environments. In this study, flexible pavement consisting of 5 layers (surface, binder, base, subbase, and subgrade) had been analyzed using FEM. The ABAQUS (6.14-2) software had been utilized to investigate the influence of the base layer depth on ver
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreOne of the artificial lightweight aggregates with a wide range of applications is Lightweight Expanded Clay Aggregate. Clay is utilized in the production of light aggregates. Using leftover clay from significant infrastructure development projects to manufacture lightweight aggregates has a favorable environmental impact. This research examines the expanded clay aggregate production process and the impact of processing parameters on its physical and mechanical qualities. It also looks at secondary components that can be used to improve the qualities of concrete with expanded clay aggregates. The effect of the quantity of expanded clay aggregate on the fresh, hardened, and durability qualities of concrete is also studied.
... Show More