Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreObjective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and
... Show MoreThe goal of this research is to better understand the physical features of starburst galaxies. Radio and X-ray observations are good for exploring the stuff within the central regions of galaxies. A galaxy that is undergoing a strong star formation, usually in its central area, is known as a starburst galaxy. This paper provides the results of a statistical analysis of a sample of starburst galaxies. The data used in this research have been collected from NASA Extragalactic Database (NED), and HYPERLEDA. Those data have been used to examine possible luminosity correlations of X-ray to a radio of a sample of starburst galaxies. In this research, statistical software, known as statistic-win-program, has been used to inves
... Show MoreCarbon dioxide geo-sequestration (CGS) into sediments in the form of (gas) hydrates is one proposed method for reducing anthropogenic carbon dioxide emissions to the atmosphere and, thus reducing global warming and climate change. However, there is a serious lack of understanding of how such CO2 hydrate forms and exists in sediments. We thus imaged CO2 hydrate distribution in sandstone, and investigated the hydrate morphology and cluster characteristics via x-ray micro-computed tomography in 3D in-situ. A substantial amount of gas hydrate (∼17% saturation) was observed, and the stochastically distributed hydrate clusters followed power-law relations with respect to their size distributions and surface area-volume relationships. The layer-
... Show MoreParasitic diseases can affect infection with COVID-19 obviously, as protective agents, or by reducing severity of this viral infection. This current review mentions the common symptoms between human parasites and symptoms of COVID-19, and explains the mechanism actions of parasites, which may prevent or reduce severity of this viral infection. Pre-existing parasitic infections provide prohibition against pathogenicity of COVID-19, by altering the balance of gut microbiota that can vary the immune response to this virus infection.
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More