In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transform and Slantlet Transform both as 2D matrix but mixed by Tensor Product. The performance parameters such as Compression Ratio, Peak Signal to Noise Ratio, and Root Mean Squared Error, are all evaluated for both standard colored and gray images. The simulation result shows that the techniques provide the quality of the images it was normal but acceptable and need more researchers works.
A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in
... Show MoreOur goal in the present paper is to introduce a new type of fuzzy inner product space. After that, to illustrate this notion, some examples are introduced. Then we prove that that every fuzzy inner product space is a fuzzy normed space. We also prove that the cross product of two fuzzy inner spaces is again a fuzzy inner product space. Next, we prove that the fuzzy inner product is a non decreasing function. Finally, if U is a fuzzy complete fuzzy inner product space and D is a fuzzy closed subspace of U, then we prove that U can be written as a direct sum of D and the fuzzy orthogonal complement of D.
The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
This research entitled: "Artistic processing of Emotional Scenes in the Narrative Film" deals with how to process and embody those emotional scenes. As there are certain filmic elements that play an effective role in deepening the viewer's sense of the importance of those scenes, and that their presence in the film is necessary and inevitable, and cannot be dispensed because it forms an interconnected connection with the rest of the film's scenes, in addition to its dramatic and aesthetic value in the film in crystallizing the viewer's feelings and integrating him/her into the scene.
The research was divided into four chapters, the first chapter includes: the methodological framework, which represented the research problem, and brin
The core idea of this study revolves around the news coverage by Iraqi satellite channels regarding corruption issues and their implications on the public's perception of the political process. The researcher designed a content analysis form encompassing both primary and sub-categories of news bulletins from the channels, Dijlah and Al-Itijah, spanning from 01/06/2021 to 31/08/2021, using a comprehensive enumeration method. The chosen timeframe preceded the parliamentary elections held in October 2021. Employing a descriptive-analytical approach coupled with observation, the researcher derived results that met the study's objectives. Among these findings, news items enhanced with video content topped the categorie
... Show MoreThis investigation was carried out to examine the Processing and effect of addition of different spices on the sensory and microbial properties of the Crispy Chicken . The results revealed than that of treatments 1 (without spices control) , 3 (anise ) , 4 (Thyme) , 5 (curry) , 6 (black Pepper) , 7 ( ginger) and 10 ( garlic ) gined higher score of overall acceptance than treatment 8 ( carnation ) . Did not significant difference of overall acceptance , between treatments 1 , 2 ( black seed ) , 3 , 4 , 5 , 6 , 7 , 9 ( onion ) and 10 and between treatments 2 , 8 and 9 . In regards with microbial tests showed aerobic bacteria highest numbers than adding 2, which amounted to more than 300 the unit cell bacterial cfu / ml and less numbers tha
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
In this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.