Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous related works to test the effectiveness of the implemented coding schema.
The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreThe issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of
... Show MoreMixed ligand complexes of bivalent metal ions, viz; M= Fe(II),Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition Na2[M (Amox)(Sac)3] in 1:1:3 molar ratio, (where Amox = Amoxicillin tryhydrate (C16H19N3O5S.H2O) and Sac = Saccharine(C7H5NO3S) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity, determination the percentage of the metal in the complexes by flame(AAS), FT-IR, magnetic susceptibility measurements and electronic spectral data. The ligands and their metal complexes have been screened for their biological activity against selected microbial strains (gram +ve) and (gram -ve).
Mixed ligand complexes of bivalent metal ions, viz; M= Fe(II),Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition Na2[M (Amox)(Sac)3] in 1:1:3 molar ratio, (where Amox = Amoxicillin tryhydrate (C16H19N3O5S.H2O) and Sac = Saccharine(C7H5NO3S) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity, determination the percentage of the metal in the complexes by flame(AAS), FT-IR, magnetic susceptibility measurements and electronic spectral data. The ligands and their metal complexes have been screened for their biological activity against selected microbial strains (gram +ve) and (gram -ve).
Several directional wells have been drilled in Majnoon oilfield at wide variation in drilling time due to different drilling parameters applied for each well. This technical paper shows the importance of proper selection of the bit, Mud type, applied weight on Bit (WOB), Revolution per minute (RPM), and flow rate based on the previous wells drilled. Utilizing the data during drilling each section for directional wells that's significantly could improve drilling efficiency presented at a high rate of penetration (ROP). Based on the extensive study of three directional wells of 35 degree inclination (MJ-51, MJ-52, and MJ-54) found that the applied drilling parameters for MJ-54 and the bit type within associated drilling parameters to drill
... Show MoreHepatitis B is an inflammation of the liver that caused by Hepatitis B virus (HBV) which is DNA virus that infects the human and some kinds of animals such as chimpanzees and birds. This disease considered as the major disease of mankind and a serious global public health problem. HBsAg, HBeAg, HBcAb, HBeAb and HBsAb are markers used to detect the presence and the stage of infection. The current study included (181) individuals from both sexes, (137) males and (44) females. By ratio 3.11: 1.The mean age of patients 2.4033 ± 0.83519 (range 18-73) years as follows < 20 (11.6%), 21–40 (47.5%), 41–60 (29.8%) and > 60 (11.0%) . These patients are 73 (40.4%) Blood donors from Central Blood Bank, 88 (48.6%) Chronic kidney failure at Ibn –
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show More