In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates (increase compression ratios) with little reduction of performance (PSNR).
The search (floors and transparent role in the design studios satellite channels) and presented as a study-oriented, and the research aims to identify the role of flooring transparent spaces studios satellite channels and side performative and aesthetic, and formulas design to highlight the role floors transparent spaces studios satellite channels. And highlight the importance of research, particularly in its contribution to the clarification of the concept of the relationship between transparency and performing aesthetic treatments for floors by clarifying its role in the designs of the internal spaces of the studios, as well as his contribution to the founding of the theory of looking at the base of such concepts. To achieve the object
... Show Moreملخص البحث باللغة الإنجليزية
The concept of the phenomenon of nuns: an analytical ideological study
Dr. Samia bint Yassin Al-Badri
Department of Islamic Doctrine & Contemporary Ideologies
College of Shariʿah & Islamic Studies
Qassim University
The study of concepts is one of the main pillars of doctrinal studies, in order to understand the formation of the concept, and to understand its contexts in religious sources, in order to be systematically criticized; So, this research came with the title:
The concept of the phenomenon of nuns, an analytical doctrinal study
The study concluded with resu
... Show MoreThis paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show MoreThe aim of human lower limb rehabilitation robot is to regain the ability of motion and to strengthen the weak muscles. This paper proposes the design of a force-position control for a four Degree Of Freedom (4-DOF) lower limb wearable rehabilitation robot. This robot consists of a hip, knee and ankle joints to enable the patient for motion and turn in both directions. The joints are actuated by Pneumatic Muscles Actuators (PMAs). The PMAs have very great potential in medical applications because the similarity to biological muscles. Force-Position control incorporating a Takagi-Sugeno-Kang- three- Proportional-Derivative like Fuzzy Logic (TSK-3-PD) Controllers for position control and three-Proportional (3-P) controllers for force contr
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr
A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show More