In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates (increase compression ratios) with little reduction of performance (PSNR).
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreKurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses
... Show MoreAs long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar
... Show MoreIn this paper, the Magnetohydrodynamic (MHD) for Williamson fluid with varying temperature and concentration in an inclined channel with variable viscosity has been examined. The perturbation technique in terms of the Weissenberg number to obtain explicit forms for the velocity field has been used. All the solutions of physical parameters of the Darcy parameter , Reynolds number , Peclet number and Magnetic parameter are discussed under the different values as shown in plots.
This paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.
Bimetallic Au –Pt catalysts supporting TiO2 were synthesised using two methods; sol immobilization and impregnation methods. The prepared catalyst underwent a thermal treatment process at 400◦ C, while the reduction reaction under the same condition was done and the obtained catalysts were identified with transmission electron microscopy (TEM) and energy-dispersive spectroscopy (EDS). It has been found that the prepared catalysts have a dimension around 2.5 nm and the particles have uniform orders leading to high dispersion of platinum molecules .The prepared catalysts have been examined as efficient photocatalysts to degrade the Crystal violet dye under UV-light. The optimum values of Bimetallic Au –
... Show MoreThe reconciliation of tax reconciliation is one of the legal methods used by the financial authority in Iraq, which is done with the taxpayer
The research dealt with the weakness of tax revenues for many reasons, including tax evasion, which led to the search for ways to reduce evasion to increase the tax revenue, and settlement reconciliation one of these means .
The research proceeded from the premise that the use of a more broadly settled settlement would govern the tax evasion of taxpayers.
The researchers used a series of studies and previous research, books and other sources related to the subject of research, and this was done through the theoretical framework, and the practical aspect that included the fin
... Show MoreThese days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreBimetallic Au –Pt catalysts supporting TiO2 were synthesised using two methods; sol immobilization and impregnation methods. The prepared catalyst underwent a thermal treatment process at 400◦ C, while the reduction reaction under the same condition was done and the obtained catalysts were identified with transmission electron microscopy (TEM) and energy-dispersive spectroscopy (EDS). It has been found that the prepared catalysts have a dimension around 2.5 nm and the particles have uniform orders leading to high dispersion of platinum molecules .The prepared catalysts have been examined as efficient photocatalysts to degrade the Crystal violet dye under UV-light. The optimum values of Bimetallic Au –Pt catalysts supp
... Show More