Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous related works to test the effectiveness of the implemented coding schema.
Background: This study was done to assist X-ray diffraction and biocompatability of glass ionomer cement reinforced by different ratios of Hydroxyapatite. Materials and Methods: The powder of glass ionomer cement reinforced by different ratios of Hydroxyapatite were used to get X-ray diffraction pattern by X-ray diffraction machine, While for biocompatibility test, A polyethylene tubes containing glass ionomer cement reinforced by different ratios of Hydroxyapatite were implanted on the dorsal submucosal site of Rabbit's tissues and histological slide were prepared for histopathological study. Results: X-ray diffraction test showed that all elements of glass ionomer cement reinforced by different ratios of Hydroxyapatite were react with eac
... Show MoreA new ligand (H4L) and its complexes with (CoII, NiII, CuII and PdII). This ligand was prepared in two steps, in the first step a solution of terephthaldehyde in methanol reacted under refluxe with 1,2-phenylenediamine to give precursore compound which reacted in the second step with 2,4- dihydroxybenzaldehyde to give the ligand. The complexes were synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods [FT-IR, UV-vis, 1HNMR, HPLC and atomic absorption], chloride contant in addition to conductivity measurement. The stability constant K and Gibbs free energy ∆G were calculated for [[Ni2(H2L)Cl2], [Cu2(H2L)Cl2] complexes using spectrophoto
... Show MoreTwo different approaches, univariate and multivariate (simplex method), have been used to obtain the optimum conditions for the quantitative Spectrophotometric determination of Eu3+ using Solochrome violet RS (3-Hydroxy-4-(2-hydroxy phenyl azo) naphthalene -1sulfonic acid) (SVRS) as a chromogenic reagent. The investigation shows that Eu3+ ion forms a wine-red complex with SVRS in alkaline buffer solution having a maximum absorbance at 464 nm against reagent blank. Calibration graphs obtained under univariate and simplex were found to be linear in the range of (0.30-8.0) µg/ml with detection limit 0.061µg/ml and molar absorptivity of 9877.66 L/mol.cm and (0.40-10.0)µg/ml with
... Show MoreCrocidolomia binotalis (Cb) (Zeller) is one of the main pests of cabbage which is difficult for farmers to control in the Ijen Crater in Indonesia. The demand for cabbage in Indonesia is increasing every year, so intensification efforts are continuously being made. Farmers intensively use synthetic pesticides as the primary control of Cb. The purpose of this study is to examine several control agents that can be used as an alternative to synthetic pesticides. Then, it provides recommendations to Ijen Crater farmers to adapt in reducing the use of synthetic pesticides. The biopesticide used was based on the Nuclear Polyhedrosis Virus strains of Spodoptera litura (SlNPV) and Helicoverpa armigera (HaNPV), botanical pesticides, and
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More
Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from
... Show MoreThis paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate inj
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreBackground/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show More