In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates (increase compression ratios) with little reduction of performance (PSNR).
Documentary Credit passes through many practical phases starting from Opening credit and matching documents and payment of the amount of credit……etc. It is worthy to mention that there are several aspects that are varied and differed from Bank to another one which can offer Competitive Advantage for the bank …This will be shown in this research.
For the purpose of achieving the objective of this research within the theoretical aspect, the researcher had seen and briefed several books and researches which are mainly related to the subject of the research.
As for the practical aspect, has included Questionnaire which included many questions that are fit and suitable to the hypotheses.
Research sample has
... Show MoreThe subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant
... Show MoreThe monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreIn this study, a novel application of lab-scale dual chambered air-cathode microbial fuel cell (MFC) has been developed for simultaneous bio-treatment of real pharmaceutical wastewater and renewable electricity generation. The microbial fuel cell (MFC) was provided with zeolite-packed anodic compartment and a cation exchange membrane (CEM) to separate the anode and cathode. The performance of the proposed MFC was evaluated in terms of COD removal and power generation based on the activity of the bacterial consortium in the biofilm mobilized on zeolite bearer. The MFC was fueled with real pharmaceutical wastewater having an initial COD concentration equal to 800 mg/L and inoculated with anaerobic aged sludge. Results demo
... Show More This paper describes the application of consensus optimization for Wireless Sensor Network (WSN) system. Consensus algorithm is usually conducted within a certain number of iterations for a given graph topology. Nevertheless, the best Number of Iterations (NOI) to reach consensus is varied in accordance with any change in number of nodes or other parameters of . graph topology. As a result, a time consuming trial and error procedure will necessary be applied
to obtain best NOI. The implementation of an intellig ent optimization can effectively help to get the optimal NOI. The performance of the consensus algorithm has considerably been improved by the inclusion of Particle Swarm Optimization (PSO). As a case s
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun
... Show MoreResearchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als
... Show MoreBackground: Complete removal of filling material from the root canal is an essential requirement for endodontic retreatment. The purpose of the present study is to evaluate and compare the dissolving capabilities of various solvents (Xylene, Eugenate Desobturator, Eucalyptol, EDTA and Distilled water (as a control)) on four different types of sealer (Endofill, Apexit Plus, AH Plus and EndoSequence bioceramic sealer). Materials and method: Eighty samples of each sealer were prepared according to the manufacturers' instructions and then divided into ten groups (of 8 samples) for immersion in the respective solvents for 2 and 5 min immersion periods. Each sealer specimen was weighed to obtain its initial mass. The specimens were immersed in
... Show More