Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous related works to test the effectiveness of the implemented coding schema.
Background: Synthetic vertebral body replacement has been widely used recently to treat different spinal conditions affecting the anterior column. They arrange from trauma, infections and even tumor conditions
Objective: To assess the functional outcome of this modality in different spinal conditions.
Patients and Methods: twenty-seven cases operated from Oct. 2010 to Dec. 9 cases had spinal fractures, 8 cases with spinal tuberculosis, and 10 cases with spinal tumors. They were followed clinically for a mean period of 36 months.
Results: All the cases approached anteriorly. 5 cases had postoperative infection. No neurological worsening reported. we had dramatic neurological improvement in all spinal tuberculo
The performance of a batch undivided electrochemical reactor with a rotating cylinder electrode of woven-wire (60 mesh size), stainless steel 316, is examined for the removal of copper from synthetic solution of o.5 M sodium chloride containing 125 ppm at pH ≈ 3.5. The effect of total applied current, rotation speed on the figures of merit of the reactor is analyzed. For an applied current of 300 mA at 100 rpm, the copper concentration decreased from 125 to mg l-1 after 60 min of electrolysis with a specific energy consumption of 1.75 kWh kg-1 and a normalized space velocity of 1.62 h-1. The change in concentration was higher when the total applied currents were increased because of the turbulence
... Show MoreThe adsorption of Congo red (CR) dye on modified synthetic zeolite 5A , the general name of which is Linde Type A (LTA)which is modified by amino mercepto thiadiazole (AMT) and have been characterized by using fourier transform infrared (FT-IR) , x-ray diffraction (XRD) spectroscopies, atomic force microscopy (AFM) and scanning electron microscope (SEM) analysis.In this work Modified zeolite was utilized as adsorbent to remove (CR) dye from aqueous solution by adsorption. Batch experiments were conducted to study the effects contact time , initial concentration of adsorbate and temperature on dye adsorption. The equilibrium adsorption data were analyzed by using several isotherm models ( Freu
... Show MoreDNA methylation is one of the main epigenetic mechanisms in cancer development and progression. Aberrant DNA methylation of CpG islands within promoter regions contributes to the dysregulation of various tumor suppressors and oncogenes; this leads to the appearance of malignant features, including rapid proliferation, metastasis, stemness, and drug resistance. The discovery of two important protein families, DNA methyltransferases (DNMTs) and Ten-eleven translocation (TET) dioxygenases, respectively, which are responsible for deregulated transcription of genes that play pivotal roles in tumorigenesis, led to further understanding of DNA methylation-related pathways. But how these enzymes can target specific genes in different malignancies;
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
Ischemic stroke is a significant cause of morbidity and mortality worldwide. Autophagy, a process of intracellular degradation, has been shown to play a crucial role in the pathogenesis of ischemic stroke. Long non-coding RNAs (lncRNAs) have emerged as essential regulators of autophagy in various diseases, including ischemic stroke. Recent studies have identified several lncRNAs that modulate autophagy in ischemic stroke, including MALAT1, MIAT, SNHG12, H19, AC136007. 2, C2dat2, MEG3, KCNQ1OT1, SNHG3, and RMRP. These lncRNAs regulate autophagy by interacting with key proteins involved in the autophagic process, such as Beclin-1, ATG7, and LC3. Understanding the role of lncRNAs in regulating auto
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More