Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreObjective(s): The study aims to evaluating the quality of nursing care provided to children under five years to compare between quality related to type of health sectors; to determine the quality of nursing care and to compare between such care in Baquba Health Care Sector I and II.
Methodology: A descriptive study is carried out for the period from December 15th 2019 to May 1st 2020. A purposive "non- probability" sample, of (60) staff nurse and (60) children is selected. An adopted questionnaire has been selected for the study which consists of three parts. The first part is nurses’ socio-demographic characteristic; the second part is ch
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show MoreTo assess the effects of dietary oil sources on productive and reproductive traits, sunflower oil, flax oil, corn oil, or fish oil were induced in quail diets. One hundred and sixty-eight 7-week-old Japanese quail were randomly assigned to 4 groups (12 males and 30 females each) with 3 replicates per group containing 4 males and 10 females each and fed for 13 weeks (including one week as an adaptation period) on a commercial diet supplemented with 3% of sunflower oil (T1), flax oil (T2), corn oil (T3), or fish oil (T4). The birds received water and were fed ad libitum during the study. The results of the experiment revealed that dietary supplementation with different sources of oil had no significant effect on male body weight, female body
... Show MoreIraqi industrial units face strong competition due to many problems including1- high production costs2- weak interest in studying the market3- lack of government support for their products4- dumping the market with imported products with specifications and a competitive price as well as adopting the traditional cost system in calculating costs that do not provide appropriate information for pricing decisions Which requires studying and analyzing these problems and dealing with them by adopting modern technologies so that they can compete, so the research aims to show the knowledge bases of technology Activity- Based Costing, with an indication of the role of technology Activity- Based Costing in rationalizing the tax In, and the
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.