In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates (increase compression ratios) with little reduction of performance (PSNR).
n-Hexane conversion enhancement was studied by adding TCE (Trichloro-ethylene) on feed stream using 0.3%Pt/HY zeolite catalyst. All experiments were achieved at atmospheric pressure and on a continuous laboratory unit with a fixed bed reactor at a temperature range 240-270◦C, LHSV 1-3h-1, H2/nC6 mole ratio 1-4.
By adding 435 ppm of TCE, 49.5 mole% conversion was achieved at LHSV 1h-1, temperature of 270ºC and H2/nC6 mole ratio of 4, while the conversion was 18.3 mol% on the same catalyst without adding TCE at the same conditions. The activation energy decreased from 98.18 for pure Pt/HY zeolite to 82.83 kJ/mole by adding TCE. Beside enhancement the activity, selectivity and product distribution enhanced by providing DMB (Dimethyl b
A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va
... Show MoreA modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify t
... Show MoreThis study examines the impact of adopting International Financial Reporting Standards (IFRS) on the value of economic units. Given the global push toward standardization of financial reporting to enhance financial statement transparency, comparability, and reliability, this research seeks to understand the implications of these standards for economic valuation within a region characterized by its unique economic and regulatory challenges. A questionnaire was distributed to 86 Iraqi academics specializing in economics, accounting, and finance to collect their views on the impact of adopting international financial reporting standards. Through careful statistical analysis, the study concluded that applying international financial reporting s
... Show MoreTransforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the pr
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAntibiotics are essential for treating infectious diseases, but their overuse and adverse effects are raising concerns about global public health. The pervasiveness of antibiotic contamination in aquatic environments has drawn increased attention in recent years. The primary concern regarding the release of antibiotics into the environment is the potential for microorganisms to become resistant to antibiotics. This review article summarizes the analytical methods used to determine the presence of trimethoprim and metronidazole in various environmental samples. These antibiotics have traditionally been analyzed using tandem mass spectrometry or high-performance liquid chromatography coupled to mass spectrometry; fluorescence or ultrav
... Show MoreArgumentation is not a contemporary, yet a deep rooted intellectual phenomenon dates back to Romans and Greeks times. The argumentative elements ,the author is trying to convey to the reader, are linguistic procedures aim at persuading and being persuaded of what is true. The present study traces, through Camus’ novel The plague, the best method to construct argumentative techniques used to express the author’s deep philosophies.
Résumé
L’argumentation n’est pas un phénomène intellectuel nouveau, ses origines reviennent aux savants grecs et romains. Elle est une act
... Show MoreIt is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro
... Show MoreThe study of vegetative change of cities is one of the most important studies related to human life because of its direct correlation with the temporal conditions that occur. These include the economic problems that force people to move and look for job opportunities in the city, which leads to an increase in the population density of cities, especially for cities with an important economic and administrative location as in the capital city of Baghdad. In this study, the effect of the increasing in population density was analyzed on the urban planning of Baghdad city. The decreasing in vegetation was due to the increasing of urban areas on the outskirts of the city, which led to an increase in its area. Moreover, urban cities increased t
... Show More