This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are comparable to those gained by standard compression schemes.
The disruptions in supply chains have put small‐ and medium‐sized enterprises (SMEs) in dire need of resilient supply chains through which they can improve their performance. Based on the resource dependence theory, this study proposes a mediation model to improve the environmental performance (EP) of SMEs. The purpose of this study is to investigate the effect of supply chain resilience (SCR) on EP mediated by ambidextrous green innovation (AMGI). We proved a structural equation model based on questionnaire data from 261 companies in Iraq to test our hypotheses. The results show that SCR has a positive effect on AMGI for proactive and exploitative green innovation dimensions and positive impact on SMEs’ EP. AMGI plays a media
... Show MoreThis research focuses on the synthesis of carbon nanotube (CNT) and Poly(3-hexylthiophene) (P3HT) (pristine polymer) with Ag doped (CNT/ P3HT@Ag) nanocomposite thin films to be utilised in various practical applications. First, four samples of CNT solution and different ratios of the polymer (P3HT) [0.1, 0.3, 0.5, and 0.7 wt.%] are prepared to form thin layer of P3HT@CNT nanocomposites by dip-coating method of Ag. To investigate the absorption and conductivity properties for use in various practical applications, structure, morphology, optical, and photoluminescence properties of CNT/P3HT @Ag nanocomposite are systematically evaluated in this study. In this regard, the UV/Vis/NIR spectrophotometer in the wavelength range of 350 to 7
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThis study objective is to identify the visual pollution in Karrada district main streets as an example of main streets in Baghdad, the public opinion about each pollutants, solutions to reduce and eliminate the pollution were suggested as well. In order to accomplish this objective different methods were used, 16 pollutants were selected, pictures of each pollutants were taken and a questioner were distributed randomly for 270 people to evaluate the public opinion with statistical methods. Garbage, their disposal and storage areas took the first two places as the highest offensive pollutants. The people showed that they find long lines of vehicles, debris and generators appearance ranked third, fourth and fifth respectively .This resear
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract
Itraconazole is a triazole antifungal given orally for the treatment of oropharyngeal and vulvovaginal candidiasis, for systemic infections including aspergillosis, candidiasis, and for the prophylaxis of fungal infections in immunocompromised patients.
The study aimed to formulate a practical water-insoluble Itraconazole, with insufficient bioavailability as nanosuspension to increase aqueous solubility and improve its dissolution and oral bioavailability.
Itraconazole nanosuspension was produced by a
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show More