NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among other wavelet functions. The system was implemented using
MATLAB R2010a. The average improvement in term of PSNR between Haar and other
wavelet functions is 1.37dB
This study including synthesis of some new Schiff bases compounds [1‐6] from the reaction of Sulfamethoxazole drug with some aromatic aldehydes in classical Schiff base method then treatment Schiff bases with succinic anhydride to get oxazepines rings [7-11]These derivatives were characterized by melting point, FT‐IR, 1H NMR and mass spectra. Some of synthesized compounds were evaluated in vitro for their antibacterial activities against three kinds of pathogenic strains Staphylococcus aureus, Escherichia coli
In the present work, a z-scan technique was used to study the nonlinear optical properties, represented by the nonlinear refractive index and nonlinear absorption coefficients of nanoparticles cadmium sulfide thin film. The sample was prepared by the chemical bath deposition method. Several testing were done including, x-ray, transmission and thickness of thin film. z-Scan experiment was performed at two wavelengths (1064 nm and 532 nm) and different energies. The results showed the effect of self-focusing in the material at higher intensities, which evaluated n2 to be (0.11-0.16) cm2/GW. The effect of two-photon absorption was studied, which evaluated β to be (24-106) cm/GW. In addition, the optical limiting behavior has been studied.
... Show MoreA detailed methodology is presented in this paper for the calculation of nucleate boiling safety margin (NBSM) in nuclear research reactors using a temperature function with three different thermal-hydraulic hot-spot analyses: nominal, cumulative and statistical for normal operating condition and coolant flow variation. A computer simulation program is developed for applying the methodology to the IRT-5000 reactor based on experimental core data. According to cumulative analysis as the overconservative approach, the NBSM at normal operating condition of thermal power 5 MW and coolant velocity 1.672 m/s was 2.3% with reactor power limit 5.13 MW. However, during power or coolant flow trip condition, transient nucleate boiling would occur for
... Show MoreThe current research aims to identify the problems and needs for both college of political science and college of engineering’s students. The sample was (100) male and female student. The results showed bunch of problems which could be organized descendingly, the scientific domain ranged between (2 - 2.42), the mean of the psychological domain was (2.85), the moral domain ranged between (2.2 – 2.28)m the problems of study earned (2.30), the material domain got (1.95), the medical and social domain obtained (1.925), and finally, the family domain received (1.887).
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreGray-Scale Image Brightness/Contrast Enhancement with Multi-Model
Histogram linear Contrast Stretching (MMHLCS) method
Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
Phosphorus is usually the limiting nutrient for eutrophication in inland receiving waters; therefore, phosphorus concentrations must be controlled. In the present study, a series of jar test was conducted to evaluate the optimum pH, dosage and performance parameters for coagulants alum and calcium chloride. Phosphorus removal by alum was found to be highly pH dependent with an optimum pH of 5.7-6. At this pH an alum dosage of 80 mg/l removed 83 % of the total phosphorus. Better removal was achieved when the solution was buffered at pH = 6. Phosphorus removal was not affected by varying the slow mixing period; this is due to the fact that the reaction is relatively fast.
The dosage of calcium chloride and pH of solution play an importa
CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.