NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among other wavelet functions. The system was implemented using
MATLAB R2010a. The average improvement in term of PSNR between Haar and other
wavelet functions is 1.37dB
Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreGypseous soil is prevalent in arid and semi-arid areas, is from collapsible soil, which contains the mineral gypsum, and has variable properties, including moisture-induced volume changes and solubility. Construction on these soils necessitates meticulous assessment and unique designs due to the possibility of foundation damage from soil collapse. The stability and durability of structures situated on gypseous soils necessitate close collaboration with specialists and careful, methodical preparation. It had not been done to find the pattern of failure in the micromechanical behavior of gypseous sandy soil through particle image velocity (PIV) analysis. This adopted recently in geotech
Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreIn this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Radiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the
... Show MoreThe research aims to verifying the tax exemptions granted in accordance with the Iraqi tax legislations, showing their suitability for basic tax rules, and identifying their role to reduce the tax evasion phenomenon and the negative effects resulting therefrom, which arerepresented by a decrease in the proceeds of tax revenue and therefore leadings to a reduction of public revenues of the state. Also, the research tries to identify the ways to reduce cases of tax evasion due to their reflection positively on the public budgetof the state. The data of the research was collected through two models of questionnaires distributed to a sample of taxpayers from some professions and a sample of the tax administration staff. The research has reac
... Show More