As a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven standard images; the achieved compression results showed good efficiency in increasing the compression while keeping the fidelity level with the acceptable level. The acquired compression ratios are 20 for color Lena and 12.4 for gray Lena, both are 32 dB of PSNR.
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreAge, hypertension, and diabetes can cause significant alterations in arterial structure and function, including changes in lumen diameter (LD), intimal-medial thickness (IMT), flow velocities, and arterial compliance. These are also considered risk markers of atherosclerosis and cerebrovascular disease. A difference between right and left carotid artery blood flow and IMT has been reported by some researchers, and a difference in the incidence of nonlacunar stroke has been reported between the right and left brain hemispheres. The aim of this study was to determine whether there are differences between the right and left common carotid arteries and internal carotid arteries in patient
The aim of the present research is to study different protein fractions in sera of children and adolescent with β –thalassemia major and minor and to compare the results with that of healthy control.One hundred fifty children and adolescents were enrolled in this study,including 50 patients with β- thalassemia major , 50 patients with β- thalassemia minor as pathological control group and another apparently 50 healthy individuals as a control group. The age of all studied groups ranged from (4-18)years.Total protein, albumin and immunoglobulins were estimated in sera of all subjects. A Significant decrease was found in the total protein and albumin&nb
... Show MoreThe degradation of Toluidine Blue dye in aqueous solution under UV irradiation is investigated by using photo-Fenton oxidation (UV/H2O2/Fe+). The effect of initial dye concentration, initial ferrous ion concentration, pH, initial hydrogen peroxide dosage, and irradiation time are studied. It is found put that the removal rate increases as the initial concentration of H2O2 and ferrous ion increase to optimum value ,where in we get more than 99% removal efficiency of dye at pH = 4 when the [H2O2] = 500mg / L, [Fe + 2 = 150mg / L]. Complete degradation was achieved in the relatively short time of 75 minutes. Faster decolonization is achieved at low pH, with the optimal value at pH 4 .The concentrations of degradation dye are detected by spectr
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreThe right to property is one of the most prominent and most important of the fundamental rights that the individual enjoys, whether national or foreign, both of them have their own private property that may not be affected except for the requirements of the country's economic development or what is known as the public benefit, and the Iraqi legislator did not specify what is meant by the removal of foreign investment. Of the bilateral international agreements (BITS), as it determined its terms and methods, the properties of foreign investors may be expropriated in a direct and indirect way.