In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transform and Slantlet Transform both as 2D matrix but mixed by Tensor Product. The performance parameters such as Compression Ratio, Peak Signal to Noise Ratio, and Root Mean Squared Error, are all evaluated for both standard colored and gray images. The simulation result shows that the techniques provide the quality of the images it was normal but acceptable and need more researchers works.
This work presents the modeling of the electrical response of monocrystalline photovoltaic module by using five parameters model based on manufacture data-sheet of a solar module that measured in stander test conditions (STC) at radiation 1000W/m² and cell temperature 25 . The model takes into account the series and parallel (shunt) resistance of the module. This paper considers the details of Matlab modeling of the solar module by a developed Simulink model using the basic equations, the first approach was to estimate the parameters: photocurrent Iph, saturation current Is, shunt resistance Rsh, series resistance Rs, ideality factor A at stander test condition (STC) by an ite
... Show MoreThe current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are absolute ethanol, 50% aqueous ethanol and water for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and
... Show MoreThermal performance of closed wet cooling tower has been investigated experimentally and theoretically
in this work. The theoretical model based on heat and mass transfer equations and heat and mass transfer balance equations which are established for steady state case. A new small indirect cooling tower was used for conducting experiments. The cooling capacity of cooling tower is 1 kW for an inlet water temperature of 38oC, a water mass velocity 2.3 kg/m2.s and an air wet bulb temperature of 26oC. This study investigates the relationship between saturation efficiency, cooling capacity and coefficient of performance of closed wet cooling tower versus different operating parameters such wet-bulb temperature, variable air-spray water fl
Abstract:
This study seeks to shed light on the important processes are linked to the impact of accounting information on the behavior of producer and user of information and are urging informational and informational use. That accounting as a system of accounting information and functions of the delivery of information to decision makers Under behavioral entrance to the formulation of accounting theory should be taken into account Othertlk accounting information in the behavior of the decision maker which requires an explanation of human behavior and predictable.
On the other hand that the accounting information that should be delivered to the decision maker will affect your beha
... Show MoreMany studies have been made and still concerning the field of translation. Since the mid-90's a considerable amount of researches has tackled the problem of gender and its effect on the process and the product of translation. Simon (1996, p 508) points out that when comparing women and men as translators and writers through history, women seem to be the weaker side. This paves the way to feminist movements which produce prominent studies concerning gender as a concept and translator's gender as practice on the quality and the accuracy of the translation.
Flotow (in Meschia, 2012, p 1-4) outlines several issues that can be
... Show MoreThis study aimed to investigate the feasibility of treatment actual potato chips processing wastewater in a continuously operated dual chambers microbial fuel cell (MFC) inoculated with anaerobic sludge. The results demonstrated significant removal of COD and suspended solids of more than 99% associated with relatively high generation of current and power densities of 612.5 mW/m3 and 1750 mA/m3, respectively at 100 Ω external resistance.
The study aimed to determine the extent of market knowledge in the companies researched, as if market knowledge is qualified to lead the companies researched to achieve marketing performance , for this purpose, formulated hypotheses of the study in three hypotheses, the first major hypothesis "there is a correlation with significance of market knowledge to improve the marketing performance , "while the second major hypothesis, "there is a significant moral influence of market knowledge to improve the marketing performance " these hypotheses targeting to determine the role played by market knowledge in the leadership of companies researched to achieve improvement in marketing perfor
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe research aims to clarify the response of the GDP to the M1 shock. It includes access to the results using standard methods, where the standard model was built according to quarterly data using the program STATA 17. According to the joint integration model ARDL, the research found a long-term equilibrium positive for the relationship between GDP and the money supply in Iraq, as the change in the money supply by a certain percentage will lead to a change in GDP by about 71% of that percentage. In the event of a shock in the Iraqi economy, the impact of the M1 will differ from what it was before the shock, as the shock will increase its effectiveness towards GDP by about 10% more than before the shock. At the same time, the relationship
... Show More