The need for image compression is always renewed because of its importance in reducing the volume of data; which in turn will be stored in less space and transferred more quickly though the communication channels.
In this paper a low cost color image lossy color image compression is introduced. The RGB image data is transformed to YUV color space, then the chromatic bands U & V are down-sampled using dissemination step. The bi-orthogonal wavelet transform is used to decompose each color sub band, separately. Then, the Discrete Cosine Transform (DCT) is used to encode the Low-Low (LL) sub band. The other wavelet sub bands are coded using scalar Quantization. Also, the quad tree coding process was applied on the outcomes of DCT and quantization processes. Finally, the adaptive shift coding is applied as high order entropy encoder to remove the remaining statistical redundancy to achieve efficiency in the performance of the compression process.
The introduced system was applied on a set of standard color image; the attained compression results indicated good efficiency in reducing the size while keeping the fidelity level above the acceptable level, where it was obtained compression ratio which is around 1:40 for Color Lena, 1:30 for color Barbara.
The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore, the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of the mobile network and its wide usage through different types of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Human eye offers a number of opportunities for biometric recognition. The essential parts of the eye like cornea, iris, veins and retina can determine different characteristics. Systems using eyes’ features are widely deployed for identification in government requirement levels and laws; but also beginning to have more space in portable validation world.
The first image was prepared to be used and monitored using CLAHE which means (Contrast Limited Adaptive Histogram Equalization) to improve the contrast of the image, after that the 3D surfac
... Show MoreIn this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show MoreHuman skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreThe present study intends to trace The friendship in puple and the differences in this according to the variables of age and sex .
The study sample includes (200) puple in intermediate, and secondary schools in Baghdad in AL- Karkh .The sample is the age of whom is ranging from (13) to (15) years .
Maghly scale for measuring the development of friendship is adopted in this study after adjusting it to the Iraqi environment . The Scale consists of (40) items .
The face and construct validity of the Scale is checked as well as its reliability which is checked by test- retest
The study reveals the following :
1 – There is positive effect of the interaction between the of middle scale friendship .
2 – There is No differe
Science, technology and many other fields are use clustering algorithm widely for many applications, this paper presents a new hybrid algorithm called KDBSCAN that work on improving k-mean algorithm and solve two of its
problems, the first problem is number of cluster, when it`s must be entered by user, this problem solved by using DBSCAN algorithm for estimating number of cluster, and the second problem is randomly initial centroid problem that has been dealt with by choosing the centroid in steady method and removing randomly choosing for a better results, this work used DUC 2002 dataset to obtain the results of KDBSCAN algorithm, it`s work in many application fields such as electronics libraries,
Renewal is generally considered an urgent requirement of life, and a section of its continuation, because renewal means that life exists and continues, and just as renewal is in life, renewal is in science, and in this research the issue of renewal in the science of interpretation, and showed through research that renewal in This science was an urgent demand throughout the Islamic ages, as the research showed the necessity of renewal in the material of interpretation, its method and methods, and the researcher presented the opinions of schools about renewal in the interpretation of the Noble Qur’an inferred by living models that refer to their owners.
The current study includes preparing a geometric proposal of the main parameters that must be worked within a seismic reflection survey to prepare a three-dimensional subsurface image. This image represents the Siba oil field located in Basra, southern Iraq. The results were based on two options for selecting these approved elements to create a three-dimensional image of the Mishrif, Zubair and Yamama formations as well as the Jurassic and Permian Khuff and the pre-Khuff reservoir area. The first option is represented in the geometry in option -1 is 12 lines, 6 shots, and 216 chs. The receiver density is 66.67 receivers / km2, so the shot density is the same. Total shots are 21000, which is the same number of receiv
... Show More