Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavelet transform (W), multi-wavelet transform (M), and tensor product mixed transform (T) as 1-level W, M, and T techniques. WT and MT are the 2-level techniques, while WWT, WMT, MWT, and MMT are the 3-level techniques. For each level of each technique, a reconstructed process is applied. The simulation results using MATLAB 2019a indicated that the MMT is the best technique with CR=1024, R(D)=4.154, and PSNR=81.9085. Also, it is faster than the other techniques in the previous works as compared with them. Further research might investigate whether this technique can benefit image and speech recognition.
Pre-breakdown phenomenon was investigated within the two, non-mixed dielectric liquids; transformation oil and cresol. Finite element technique was used to follow the initiation and growth of plasma channels (streamer discharge) within pin-plane configuration. That was done for different spacing between the pin-electrode and the liquid-liquid interface. Streamer growth model assumed that, the streamer initiation occurs at the region of the highest value of electric field. Our study shows that the streamer initiates at the tip of the pin and growths toward the other electrode. The study shows, too, that the streamer path controlled by the difference of permittivity of the two liquids and spacing distance of the liquid-liquid interface fro
... Show MoreIn the present study, mixed ligand compounds of Mn(II), Ni(II), Co(II), Cu(II), Cd(II) and Hg(II) were synthesized using new Ligand N1,N4-bis (pyrimidin-2-ylcarbamothioyl) succinimide (NPS) derived from [Butanedioyl diisothiocyanate with 2- aminipyridine] as first ligand, proline (pro) as second ligand and evaluation of their antioxidant activities for ligand, nickel and cobalt complex towards 1.1-Di-phenyl-2picrylhydrazyl (DPPH) will be compared to the standard anti-oxidants (i.e. the ascorbic acid). Those materials that have been prepared provided results are a result of exhibiting different activities of the radical scavenging for all of the compounds. Compounds were observed then confirmed through the Fourier-tra
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreThe paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing
... Show More