In this paper, a hybrid image compression technique is introduced that integrates discrete wavelet transform (DWT) and linear polynomial coding. In addition, the proposed technique improved the midtread quantizer scheme once by utilizing the block based and the selected factor value. The compression system performance showed the superiority in quality and compression ratio compared to traditional polynomial coding techniques.
This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.
New class A^* (a,c,k,β,α,γ,μ) is introduced of meromorphic univalent functions with positive coefficient f(z)=□(1/z)+∑_(n=1)^∞▒〖a_n z^n 〗,(a_n≥0,z∈U^*,∀ n∈ N={1,2,3,…}) defined by the integral operator in the punctured unit disc U^*={z∈C∶0<|z|<1}, satisfying |(z^2 (I^k (L^* (a,c)f(z)))^''+2z(I^k (L^* (a,c)f(z)))^')/(βz(I^k (L^* (a,c)f(z)))^''-α(1+γ)z(I^k (L^* (a,c)f(z)))^' )|<μ,(0<μ≤1,0≤α,γ<1,0<β≤1/2 ,k=1,2,3,… ) . Several properties were studied like coefficient estimates, convex set and weighted mean.
In this research paper, we explain the use of the convexity and the starlikness properties of a given function to generate special properties of differential subordination and superordination functions in the classes of analytic functions that have the form in the unit disk. We also show the significant of these properties to derive sandwich results when the Srivastava- Attiya operator is used.
The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.
This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin
... Show MoreAs of late, humankind has experienced radiation issues either computerized tomography (CT) or X-rays. In this investigation, we endeavor to limit the effect of examination hardware. To do this the medical image is cropping (cut and zoom) then represented the vascular network as a graph such that each contraction as the vertices and the vessel represented as an edges, the area of the coagulation was processed already, in the current search the shortest distance to reach to the place of the blood vessel clot is computed
The dispersion relation of linear quantum ion acoustic waves is derivate according to a fluid approach that depends on the kinetic description of the systems of charged particles model. We discussed the dispersion relation by changing its parameters and graphically represented. We found through graphs that there is full agreement with previous studies on the subject of interest. That motivates us to discuss the dispersion relation of waves depending on the original basic parameters that implicitly involved in the relationship which change the relationship by one way or another, such as electron Fermi temperature and the density at equilibrium state.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreIn the presence of multi-collinearity problem, the parameter estimation method based on the ordinary least squares procedure is unsatisfactory. In 1970, Hoerl and Kennard insert analternative method labeled as estimator of ridge regression.
In such estimator, ridge parameter plays an important role in estimation. Various methods were proposed by many statisticians to select the biasing constant (ridge parameter). Another popular method that is used to deal with the multi-collinearity problem is the principal component method. In this paper,we employ the simulation technique to compare the performance of principal component estimator with some types of ordinary ridge regression estimators based on the value of t
... Show MoreIn this work, a class of stochastically perturbed differential systems with standard Brownian motion of ordinary unperturbed differential system is considered and studied. The necessary conditions for the existence of a unique solution of the stochastic perturbed semi-linear system of differential equations are suggested and supported by concluding remarks. Some theoretical results concerning the mean square exponential stability of the nominal unperturbed deterministic differential system and its equivalent stochastically perturbed system with the deterministic and stochastic process as a random noise have been stated and proved. The proofs of the obtained results are based on using the stochastic quadratic Lyapunov function meth
... Show More