This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been evaluated through experiments with the decomposition of database image consists of important documents like college certifications up to maximal decomposition level of 14. The tests results using the HYBRID algorithm were compared with that of the other methods (Haar and D4 Lifting scheme) in terms of the accuracy of discovering forgeries (retrieval accuracy) and the required store memory area. The results illustrate that the HYBRID algorithm show better performance than the others in terms of the sensitivity to any change in the retrieval documents. Also, HYBRID Algorithm exhibits good improvement in terms of the used memory space compared to the results obtained by D4 Lifting scheme.
Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per
... Show MoreThe effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.
The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show MoreIn this study, the dynamic modeling and step input tracking control of single flexible link is studied. The Lagrange-assumed modes approach is applied to get the dynamic model of a planner single link manipulator. A Step input tracking controller is suggested by utilizing the hybrid controller approach to overcome the problem of vibration of tip position through motion which is a characteristic of the flexible link system. The first controller is a modified version of the proportional-derivative (PD) rigid controller to track the hub position while sliding mode (SM) control is used for vibration damping. Also, a second controller (a fuzzy logic based proportional-integral plus derivative (PI+D) control scheme) is developed for both vibra
... Show MoreAbsence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa
Abstract: Two different shapes of offset optical fiber was studied based on coreless fiber for refractive index (RI)/concentration (con.) measurement, and compare them. These shapes are U and S-shapes, both shapes structures were formed by one segment of coreless fiber (CF) was joined between two single mode (SMF) lead in /lead out with the same displacement (12.268µm) at both sides, the results shows the high sensitive was achieved in a novel S-shape equal 98.768nm/RIU, to our knowledge, no one has ever mentioned or experienced it, it’s the best shape rather than the U-shape which equal 85.628nm/RIU. In this research, it was proved that the offset form has a significant effect on the sensitivity of the sensor. Addi
... Show MoreIn this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreArtificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the
domain of optimization and operation research. Several research papers dealt with methods of solving this
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested
employing the improved algorithm to confirm its effectiveness and evaluate its ex