The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing small binary codebook, then rotating each block in it. Moreover, it can be used for improving the efficiency of the coding process even further with the decrease in the bit rate (i.e. increasing the compression ratio(.
Polycystic ovarian syndrome, additionally called PCOS is the most widespread endocrine illness amongst women. The aetiology of PCOS is attributed to a multi-factorial interplay among environmental and genetic effects. The overarching goal evaluates the correlation among blood concentrations of total testosterone, sex-hormone-binding globulin (SHBG), estradiol (E2), follicle-stimulating hormone (FSH) and luteinizing hormone (LH) in ladies with PCOS and the impact of obesity, age, marital popularity on the obtained results. This study was conducted at the National Center for Educational Laborites /Medical City/ Baghdad. The study comprised of a sample of 83 women, elderly between 17 -45 years, who had been selected in a random manner
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreIn this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.
This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show MoreShehadt 683 fish of different fish present in the tank Haditha Dam during the period of February 1993 and the end Maes 1994 to identify the nutritional content of the digestive tract or the stomach for these fish and their impact on the environment of the tank and found that Fish fine linen and Alhalg animal feeding predators feed on small fish, mainly the fish brown plantnutrition
Gypseous soil is considered as a problematic soil for embankment construction, however, implementation of emulsified asphalt as a stabilization agent could be a proper solution for enhancing its properties as a subgrade soil. In this work, the sustainability of asphalt stabilized soil has been assessed in terms of its resistance to cyclic (freezing-thawing) and (heating-cooling) processes. Specimens have been prepared at optimum fluid content (moisture and emulsion) and tested under direct shear stresses while subjected to 30 cycles of (freezing-thawing) and (heating-cooling). Both of dry and soaked testing conditions have been implemented. Data have been observed after each 10 cycles, and compared with that of reference mix. It was conclud
... Show More