Preferred Language
Articles
/
ZRZEYIcBVTCNdQwCKEif
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal image compression, specifically for the block indexing methods based on the moment descriptor.  Block indexing method depends on classifying the domain and range blocks using moments to generate an invariant descriptor that reduces the long encoding time. A comparison is performed between the blocked indexing technology and other fractal image techniques to determine the importance of block indexing in saving encoding time and achieving better compression ratio while maintaining image quality on Lena image.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 04 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Dissolution Enhancement of Raltegravir by Hot Melt Extrusion Technique
...Show More Authors

The objective of the study to develop an amorphous solid dispersion for poorly soluble raltegravir by hot melt extrusion (HME) technique. A novel solubility improving agent plasdone  s630 was utilized. The HME raltegravir was formulated into tablet by direct compression method. The prepared tablets were assessed for all pre and post-compression parameters. The drug- excipients interaction was examined by FTIR and DSC. All formulas displayed complying with pharmacopoeial measures. The study reveals that formula prepared by utilizing drug and plasdone S630 at 1:1.5 proportion and span 20 at concentration about 30mg (trail-6) has given highest dissolution rate than contrasted with various formulas of raltegravir.

Keywor

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 28 2024
Journal Name
Journal Of Advances In Information Technology
Enhancement of Recommendation Engine Technique for Bug System Fixes
...Show More Authors

This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jul 17 2019
Journal Name
Iraqi Journal Of Science
An Approximation Technique for Fractional Order Delay Differential Equations
...Show More Authors

In this research article, an Iterative Decomposition Method is applied to approximate linear and non-linear fractional delay differential equation. The method was used to express the solution of a Fractional delay differential equation in the form of a convergent series of infinite terms which can be effortlessly computable.
The method requires neither discretization nor linearization. Solutions obtained for some test problems using the proposed method were compared with those obtained from some methods and the exact solutions. The outcomes showed the proposed approach is more efficient and correct.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Generalization of Rough Set Theory Using a Finite Number of a Finite d. g.'s
...Show More Authors

This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.

View Publication Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 05 2014
Journal Name
International Journal Of Applied Mathematical Research
Approximate solution of a model describing biological species living together using a new iterative method
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Meta Gene
Association analysis of FTO gene polymorphisms rs9939609 and obesity risk among the adults: A systematic review and meta-analysis” Meta Gene (2020) 7–7/100832
...Show More Authors

Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgro

... Show More
View Publication
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of New Theory
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Wed Dec 01 2021
Journal Name
International Journal Of Research In Social Sciences & Humanities. E-issn
CONCEPTS OF LITERATURE: COMPARATIVE LITERATURE BY HENRY GIFFORD (an Article REVIEW).
...Show More Authors

BOOK REVIEW