The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing small binary codebook, then rotating each block in it. Moreover, it can be used for improving the efficiency of the coding process even further with the decrease in the bit rate (i.e. increasing the compression ratio(.
“Child of today is a man of the future" this slogan is one of the most popular logos of international organizations and institutions that dealing with human beings needs in general and children needs in particular, whether these needs are educational, health, social, or economic. Children require special care and extra legal protection, since the child-raising is not the Child’s own issue, but it's the issue of the society in which he/she would integrate.
As the education and language skillsacquisition primarily associated with hearing, because human being receives most of the skills and knowledge through the hearing; that imitate sounds and learn how to speak isacquired only by hearing, so therefore the hearing - impairedchi
... Show MoreLet be a commutative ring with 1 and be left unitary . In this paper we introduced and studied concept of semi-small compressible module (a is said to be semi-small compressible module if can be embedded in every nonzero semi-small submodule of . Equivalently, is semi-small compressible module if there exists a monomorphism , , is said to be semi-small retractable module if , for every non-zero semi-small sub module in . Equivalently, is semi-small retractable if there exists a homomorphism whenever . In this paper we introduce and study the concept of semi-small compressible and semi-small retractable s as a generalization of compressible and retractable respectively and give some of their adv
... Show MoreLet be a commutative ring with 1 and be left unitary . In this paper we introduced and studied concept of semi-small compressible module (a is said to be semi-small compressible module if can be embedded in every nonzero semi-small submodule of . Equivalently, is semi-small compressible module if there exists a monomorphism , , is said to be semi-small retractable module if , for every non-zero semi-small sub module in . Equivalently, is semi-small retractable if there exists a homomorphism whenever .
In this paper we introduce and study the concept of semi-small compressible and semi-small retractable s as a generalization of compressible and retractable respectively and give some of
... Show MoreLet be a commutative ring with 1 and be left unitary . In this papers we introduced and studied concept P-small compressible (An is said to be P-small compressible if can be embedded in every of it is nonzero P-small submodule of . Equivalently, is P-small compressible if there exists a monomorphism , , is said to be P-small retractable if , for every non-zero P-small submodule of . Equivalently, is P-small retractable if there exists a homomorphism whenever as a generalization of compressible and retractable respectively and give some of their advantages characterizations and examples.
Polarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomenon in the waveguide. The simulation results demonstrate a polarization co
... Show MorePolarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomeno
The study aims at elicitation the morals strategies from sunnah depending on the analytic-qualitative method. It revealed a comprehensive integrated system of creative strategies to improve morals. It was categorized into three areas: cognitive strategies, affective strategies, and some strategies based on self-initiative and practice. The researcher recommended that teachers and educators should employ these effective strategies in the process of moral guidance for the Muslim generation. He also recommended that researchers should put more effort to do more In-depth qualitative studies, which must be directed to establish the origin of different education strategies from the Holy Qur’an, the Sunnah, and Muslim scholars’ legacy.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreA true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems