In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.
In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreIn this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.
Article information: COVID-19 has roused the scientic community, prompting calls for immediate solutions to avoid the infection or at least reduce the virus's spread. Despite the availability of several licensed vaccinations to boost human immunity against the disease, various mutated strains of the virus continue to emerge, posing a danger to the vaccine's ecacy against new mutations. As a result, the importance of the early detection of COVID-19 infection becomes evident. Cough is a prevalent symptom in all COVID-19 mutations. Unfortunately, coughing can be a symptom of various of diseases, including pneumonia and inuenza. Thus, identifying the coughing behavior might help clinicians diagnose the COVID-19 infection earlier and distinguish
... Show MoreAims current research to identify the mistakes coding contained in the reading first grade. Encoding knew that he had failed in Retrieval or identifying information, the researcher diagnosis of mistakes and presented to a group of teachers first grade and they have an appropriate adjustment and using the percentage shows that the agreement on the mistakes ratio and adjusted researcher recommended a set of proposals and recommendations can work out the future for the advancement of scientific level
Obesity is a risk factor associated with age-related disorders that accelerate aging, and it increases the risk of metabolic diseases. Therefore, this study was conducted to investigate the association of leukocyte telomere length (LTL) with the presence of higher body weight in middle-aged females and males. The study subjects comprised 160 (80 control and 80 higher body mass index BMI groups) with ranging ages of 30-50 years included and stratified for BMI. The physio-biochemical analysis was measured using enzymatic determination. Mean telomere length was determined by using the southern blotting technique. The association analysis revealed a significant variance (P < 0.01) in biochemical parameters between higher BMI grou
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show More