In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid
technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression
Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in
... Show MoreThe possible effect of the collective motion in heavy nuclei has been investigated in the framework of Nilson model. This effect has been searched realistically by calculating the level density, which plays a significant role in the description of the reaction cross sections in the statistical nuclear theory. The nuclear level density parameter for some deformed radioisotopes of (even- even) target nuclei (Dy, W and Os) is calculated, by taking into consideration the collective motion for excitation modes for the observed nuclear spectra near the neutron binding energy. The method employed in the present work assumes equidistant spacing of the collective coupled state bands of the considered isotopes. The present calculated results for f
... Show MoreThis study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge tha
... Show MoreABSTRACT : A new ligand [ 2- (3-acetylthioureido)-3-phenylpropanoic acid (APA) is synthesized by reaction of acetyl isothiocyanate with phenylalanine (1:1). It is characterized by micro elemental analysis (C.H.N.S.), FT-IR, (UV-Vis) and 1H and 13CNMR spectra. Some metals ions complexes of this ligand were prepared and characterized by FT-IR, UV-Visible spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From results obtained, the following formula [M(APA)2] where M2+ = Mn, Co, Ni, Cu, Zn, Cd and Hg, the proposed molecular structure for these complexes as tetrahedral geometry, except copper complex is has square planer geometry.
Collapse of the vapor bubble condensing in an immiscible is investigated for n-pentane and n-hexane vapors condensing in cold water and n-pentane in two different compositions of glycerin- water mixture. The rise velocity and the drag coefficient of the two-phase bubble are measured.
Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit
... Show MoreExogenous levothyroxine dose modulation and euthyroidism achievement is a persistent challenge in clinical settings. This study strives to assess the adequacy of treatment and identify the patients’ factors that can be used to estimate the euthyroid levothyroxine dose. A secondary objective was to assess vitamin D supplementation impact on thyroid status.
A review of a prospectively collected information from 142 female patients from Baghdad Center of Nuclear Medicine from June 2019 until March 2020 who were receiving levothyroxine for different causes was done. After a follow-up period, the patients’ thyroid tests were assessed and the euthyroid doses for each cause category were statistically analyzed. Thyroid function was
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreWe observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and