In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid
technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression
The theatrical show consists of theatrical techniques that form the space to display the play that may form conscious visual effects about the receiver. The current search included the (Research problem) which is the immediate question ((What makes the theatrical techniques dazzling and visually exciting in a certain theatrical show?))
It also included (the importance of research) by highlighting the importance of theatrical techniques and the mechanism of contrast.
It also identified the visual stimulus of theatrical techniques in the theater show.
It also included the (research limits), which were temporally determined by the period (1990-1998) and spatially, the Iraqi theater shows (Baghdad), in which theatrical techniques c
Increasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authen
... Show MoreThis paper presents an architecture for the data warehouse of outpatient healthcare (DWOP) as a data repository collects data from two different sources (Databases of outpatient healthcare and Excel files from hospitals) and provides storage, functionality and responsiveness to queries to meet decision makers requirements.
Successfully supporting managerial decision-making is critically dependent upon the availability of integrated, high quality information organized and presented in a timely and easily understood manner. “On-Line Analytical Processing (OLAP) is utilized for decision support to get interesting information†from the data warehouse with a rapid execution time. OLAP is considered one of Business Intelligence
This study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh
... Show MoreWe propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreCOVID-19 affected the entire world due to the unavailability of the vaccine. The social distancing was a contributing factor that gave rise to the usage of Online Social Networks. It has been seen that people share the information that comes to them without verifying its source . One of the common forms of information that is disseminated that have a radical purpose is propaganda. Propaganda is organized and conscious method of molding conclusions and impacting an individual's contemplations to accomplish the ideal aim of proselytizer. For this paper, different propagandistic tweets were shared in the COVID-19 Era. Data regarding COVID-19 propaganda was extracted from Twitter. Labelling of data was performed manually using diffe
... Show MoreSpin coating technique used to prepare ZnPc, CdS and ZnPc/CdS blend thin films, these films annealed at 423K for 1h, 2h and 3h. Optical behavior of these films were examined using UV-Vis. and PL. The absorption spectrum of ZnPc shows a decreasing in absorption with the increase of annealing time while CdS spectrum give a clearly absorption peak at~510 nm. Energy gap of ZnPc increases from 1.41 to 1.52 eV by increasing the annealing time. Eg of CdS decrease by increasing annealing time, from 2.3 eV to 2.2 eV. The intensities of the peaks obtained from PL spectra were strongly dependent on annealing time and confirmed the results obtained from UV-Vis. D.C. conductivity measurement showed that all the thin films have two differen
... Show MoreThis study presents an investigation about the effect of fire flame on the punching shear strength of hybrid fiber reinforced concrete flat plates. The main considered parameters are the fiber type (steel or glass) and the burning steady-state temperatures (500 and 600°C). A total of 9 half-scale flat plate specimens of dimensions 1500mm×1500mm×100mm and 1.5% fiber volume fraction were cast and divided into 3 groups. Each group consisted of 3 specimens that were identical to those in the other groups. The specimens of the second and the third groups were subjected to fire flame influence for 1 hour and steady-state temperature of 500 and 600°C respectively. Regarding the cooling process, water sprinkling was applied directly aft
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show More