Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal image compression, specifically for the block indexing methods based on the moment descriptor. Block indexing method depends on classifying the domain and range blocks using moments to generate an invariant descriptor that reduces the long encoding time. A comparison is performed between the blocked indexing technology and other fractal image techniques to determine the importance of block indexing in saving encoding time and achieving better compression ratio while maintaining image quality on Lena image.
The basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
In this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.
The concept of separation axioms constitutes a key role in general topology and all generalized forms of topologies. The present authors continued the study of gpα-closed sets by utilizing this concept, new separation axioms, namely gpα-regular and gpα-normal spaces are studied and established their characterizations. Also, new spaces namely gpα-Tk for k = 0, 1, 2 are studied.
In this paper we prove that the planar self-assembling micelle system
has no Liouvillian, polynomial and Darboux first integrals. Moreover, we show that the system
has only one irreducible Darboux polynomial with the cofactor being if and only if via the weight homogeneous polynomials and only two irreducible exponential factors and with cofactors and respectively with be the unique Darbox invariant of system.
In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MorePurification of fifteen NaCl samples from natural and different area in the middle and south of Iraq are prepared and studied the structural characteristics of samples by powder X-ray diffraction analysis at ð›Œ=1.542Ã…. The present work considered the specific activities of naturally occurring radioactive materials in salt samples, which are measured and analyzed using high resolution HPGe system. Also, the radiological parameters have been considered in this work. The average specific concentration (in Bq.kg-1) of the salt samples is found 16.864.92 for 226Ra, 5.972.05 for 232Th and 9.852.8 for 40K, respectively, which are below the national levels, 40Bq.kg-1, 30Bq.k
... Show MoreSuccess in selecting the best among the sources of supply is one of the most important factors in the efficiency of the procurement activity in the company, because the proper selection of the source of the supply significantly affect the achievement of what is desired by the factors of quality, quantity, price and service, and the ability of the competent supplier to meet everything associated with this Factors of commitments, hereby supporting the procurement function's efforts to fully discharge its responsibilities, and in view of adopting of Al-Furat company quality management system by applying the standards of ISO (9001: 2015) and purpose of getting the on-demand benefits from the application of international standards reg
... Show MoreThe main aim of this paper is to use the notion which was introduced in [1], to offered new classes of separation axioms in ideal spaces. So, we offered new type of notions of convergence in ideal spaces via the set. Relations among several types of separation axioms that offered were explained.