Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MorePurpose: The research aims to determine the relationship between E-Learning and Total Quality Management (TQM) in Educational institutions in Nineveh Governorates.
Methodology / Design: The researchers distributed (30) questionnaires to employees (teachers and administrators) of Nineveh Governorate education who represent the community of the research sample, as they were analyzed using the SPSS V.20
The importance of research: The importance of the research in the fact that it focuses on one of the educational methods represented in integrating the traditional method and relying on modern technologies using computers and the Internet in the field of education to improve the reali
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using thr
... Show MoreThe objective of the present work was to estimate water requirements and water use efficiency for Broccoli under normal irrigation conditions and sewage irrigation. Field experiment was carried out during the season 2018 at station/Sulaimni agricultural station/Bakrajo –College of Agricultural Sciences. The experiment included three treatments: River water irrigation in all season growth (I1), Sewage water irrigation in all season growth (I2), Alternate irrigation (one river irrigation followed by two sewage water irrigation) in all season growth (I3). The experimental Design was Randomized Complete Block Design (RCBD) w
This research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was
... Show MoreOne of the most important parameters determining structural members' durability and strength is the fire flame's influence and hazard. Some engineers have advocated using advanced analytical models to predict fire spread impact within a compartment and considering finite element models of structural components to estimate the temperatures within a component using heat transfer analysis. This paper presented a numerical simulation for a reinforced concrete beam’s structural response in a case containing Water Absorbing Polymer Spheres (WAPS) subjected to fire flame effect. The commercial finite element package ABAQUS was considered. The relevant geometrical and material parameters of the reinforced concrete beam model at elevated t
... Show More