NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among other wavelet functions. The system was implemented using
MATLAB R2010a. The average improvement in term of PSNR between Haar and other
wavelet functions is 1.37dB
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe scope of the electrical power facility is determined by its employees' mistakes as follows and subject to its control and guidance, as well as those affiliated with mechanical machines or dangerous things that require special attention, and can be denied the responsibility based on a number of means to which the defendant is resorted to it, the law has been granted For the requirements of justice and to judge the judiciary in many of the provisions issued by an investigation into the principle of equity. The most important mistakes, which are the most important means that the electric power facility can resort to existing responsibility in accordance with Article (219) of the Iraqi Civil Law, which is responsible for fulfilling acts,
... Show MoreThe immunity enjoyed by members of parliament is one of the most important guarantees for the performance of their parliamentary work, which protects them from threats or any reprisals against them.
There are two types of immunity:
Objective immunity: the member does not bear any responsibility for the opinions, ideas, and statements he expresses within the council or its committees, but even outside it by some systems.
Procedural immunity: that prevents criminal actions from being taken during or outside the session of the Council, with the approval of a body specified by the constitutions of the countries under study, but it is restricted by conditions and controls stipulated. It contains constitut
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThis research aims to identify the reality of teaching political science research methods curriculum, to observe practices, and differences in teaching and learning between the Arab and Western universities. Moreover, it focuses on the difficulties that face students' acquisition of the course skills. The research uses the course model of some Western and Arab universities as case study.
This research shows that the curriculum do not reach yet the final form as other political science curriculums, and its upcoming changes will reflect the needs of stakeholders. The best method to teach this curriculum is to use applied learning in groups, learning by doing, and finally problem-based learning approach. Using optimal assessment deep
... Show MoreSince 1990 internal combustion engines and variable systems has been considered as emission. Noise can be defined as undesirable sound, and in high levels it can be considered ahealth hazard. Large internal combustion engines produce high levels of noise. In many countries there are laws restricting the noise levels in large engine rooms and fixed applications. Locomotives engines have the minimum emission influence because of noise control techniques capability.
In this paper study on a single cylinder internal combustion engine was conducted. The engine works by adding ethanol to gasoline, at variable speeds, without adding ethanol, and with adding 10 and 20% ethanol in volumetric ratio. Using one sound insulator or two or with
... Show MoreA literary-educational work is a work that explains wisdom to the reader and presents moral, educational and instructional issues in a literary form. Qaboos-nameh or Nasihat al-Muluk is an educational and educational book that has a special place in the field of ethics and guidance, where the author guides his children. Also, Ibn al-Wardi's Lamiyah or Nasihat al-Akhwan is a poem containing moral advice and advice in 77 verses that Ibn al-Wardi wrote to his son.
It seems that the main goal of Ibn al-Wardi and Onsur AL-maali in Lamia and Qaboos-nameh was to express educational and moral issues and spread and convey them to future generations. Ibn al-Wardi, like Onsur AL-maali, listed moral points such as knowledge, humility
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
The right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?
The research aims to get acquainted with the evaluation of the reality of the application of the curriculum axis from among the eight Iraqi academic accreditation standards in a sample of governmental and private universities and colleges in Iraq and to identify the main and secondary reasons for it as well as to provide proposed mechanisms and procedures to help reduce gaps, If the research problem is represented in the weak availability of the requirements of the curriculum axis in universities and colleges (the study sample) due to the weak documentation and successful implementation of them and interest in them is still below the level of ambition, In order to arrive at scientific facts, the researchers adopted the comparativ
... Show More