In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid
technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression
During the last few decades, many academic and professional groups gave attention to adopting the multi-criteria decision-making methods in a variety of contexts for decision-making that are given to the diversity and sophistication of their selections. Five different classification methods are tested and assessed in this paper. Each has its own set of five attribute selection approaches. By using the multi-criteria decision-making procedures, these data can be used to rate options. Technique for order of preference by similarity to ideal solution (TOPSIS) is designed utilizing a modified fuzzy analytic hierarchy process (MFAHP) to compute the weight alternatives for TOPSIS in order to obtain the confidence value of each class
... Show More
Thin films of CuPc of various thicknesses (150,300 and 450) nm have been deposited using pulsed laser deposition technique at room temperature. The study showed that the spectra of the optical absorption of the thin films of the CuPc are two bands of absorption one in the visible region at about 635 nm, referred to as Q-band, and the second in ultra-violet region where B-band is located at 330 nm. CuPc thin films were found to have direct band gap with values around (1.81 and 3.14 (eV respectively. The vibrational studies were carried out using Fourier transform infrared spectroscopy (FT-IR). Finally, From open and closed aperture Z-scan data non-linear absorption coefficient and non-linear refractive index have been calculated res
... Show MoreThe effect of adding different volume of coumarin dye (5, 15, 25 and 35) ml on optical properties of Poly (Methyl Meth Acrylate) was studied. Films of pure PMMA and PMMA with different volume of coumarin dye (5, 15, 25 and 35) ml were prepared using the casting technique. Transmission and absorption of the films were measured by using UV-VIS spectrometer technique type (100 Conc), in order to assess the type of transmission which was found an indirect transition. An optical energy gap of pure PMMA is (4.95e v) and after adding coumarin with volume (25, 35) ml, the energy gap for PMMA decrease by (0.05) compere to pure PMMA films and addition energy gap appear equal to (4.1 e v). It was found that the absorption coefficient, extinction coeff
... Show MoreIn this research we studied the structural and optical properties of (CdTe) thin films which have been prepared by thermal evaporation deposition method on the glass substrate at R.T with thickness (450  25) nm., as a function of doping ratio with copper element in (1,3,5) % rate .The structure measurement by X-ray diffraction (XRD) analyses shows that the single phase of (CdTe) with polycrystalline structure with a preferred orientation [111]. The optical measurement shows that the (CdTe) films have a direct energy gap, and they decrease with the increase of doping ratio reaching to 5% . The optical constants are investigated and calculated, such as absorpti
... Show MoreBig data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreThis study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th
... Show MoreCloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show MoreThis work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show More