In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transform and Slantlet Transform both as 2D matrix but mixed by Tensor Product. The performance parameters such as Compression Ratio, Peak Signal to Noise Ratio, and Root Mean Squared Error, are all evaluated for both standard colored and gray images. The simulation result shows that the techniques provide the quality of the images it was normal but acceptable and need more researchers works.
E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreAbstract
The research aims to identify the logical intelligence of distinguished students and to identify the extent of the contribution of the fields of logical intelligence to the sensitivity of students' sensory processing in distinguished schools. The research sample consisted of (400) male and female students selected by the stratified random method with the proportional method. The scale that was prepared according to the theoretical framework and the adopted theory was applied after being subject to the psychometric properties of validity and reliability, Logical thinking (observation, interpretation, mathematical and arithmetic operations) contributed to sensory processing. The results showed that disting
... Show MoreThis paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.
A new scheme of plasma-mediated thermal coupling has been implemented which yields the temporal distributions of the thermal flux which reaches the metal surface, from which the spatial and temporal temperature profiles can be calculated. The model has shown that the temperature of evaporating surface is determined by the balance between the absorbed power and the rate of energy loss due to evaporation. When the laser power intensity range is 107 to108 W/cm2 the temperature of vapor could increase beyond the critical temperature of plasma ignition, i.e. plasma will be ignited above the metal surface. The plasma density has been analyzed at different values of vapor temperature and pressure using Boltzmann’s code for calculation of elec
... Show MoreA rapid high performance liquid chromatography method for the determination of sphinganine (Sa) and sphingosine (So) in urine samples by employing a silica-based monolithic column is described. The samples were first extracted using ethyl acetate and derivatized using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol. C20 sphinganine was used as internal standard. Under the optimized conditions, separation was achieved using a mixture of methanol:water (93:7, v/v), column temperature at 30°C, flow rate of 1 mL min−1, and an injection volume of 10 μL. Good linearity was obtained for Sa and So over the concentration range 20–500 ng mL−1(correlation coefficients ≥0.9978). The detection limits were 0.45 ng mL−1 for Sa and
... Show MoreThe research intent evaluates the performance of material technical department / Technical College -Baghdad.
The study depend on the descriptive analytical approach to determine and treating the variables to get data and information that related to study, the researchers depended on questionnaire designed for this purpose and contains eight main dimensions that’s are scientific reference , academy course, staff member , administrative system, physical facilities , student ,scientific research, graduate service , in addition each dimension involved (5) items contacted with mean dimensions, which translate aspects of performance evaluation, the questionnaire applied on two samples staff member
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show More