In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
The research aims to present a proposed strategy for the North Oil Company, and the proposed strategy took into account the surrounding environmental conditions and adopted in its formulation on the basis and scientific steps that are comprehensive and realistic, as it covered the main activities of the company (production and exploration activities, refining and refining activities, export and transport of oil, research and development activity, financial activity, information technology, human resources) and the (David) model has been adopted in the environmental analysis of the factors that have been diagnosed according to a
... Show MoreSeveral attempts have been made to modify the quasi-Newton condition in order to obtain rapid convergence with complete properties (symmetric and positive definite) of the inverse of Hessian matrix (second derivative of the objective function). There are many unconstrained optimization methods that do not generate positive definiteness of the inverse of Hessian matrix. One of those methods is the symmetric rank 1( H-version) update (SR1 update), where this update satisfies the quasi-Newton condition and the symmetric property of inverse of Hessian matrix, but does not preserve the positive definite property of the inverse of Hessian matrix where the initial inverse of Hessian matrix is positive definiteness. The positive definite prope
... Show MoreIn this study, plastic wastes named (PET and PVC) were used to prepare polymer matrix composite (PMC) which can be used in different applications. Composite materials were prepared by mixing unsaturated polyester resin (UP) with plastic wastes, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with various weight fractions (0, 5,10,15, 20 and 25%) added as a filler in flakes form. In this work, some of the tests that were carried out included (tensile, bending, and compressive strength) as mechanical tests, in addition to (thermal conductivity and water absorption) as physical tests. The values of tensile, compressive strength and Young's modulus of UP increased after
... Show MorePVA:PEG/MnCl2 composites have been prepared by adding (MnCl2) to the mixture of the poly vinyl alcohol (PVA) and poly ethylene glycol (PEG) with different weight percentages (0, 2, 4, 6, 8 and 10) wt.% by using casting method. The type of charge carriers, concentration (nH) and Hall mobility (μH) have been estimated from Hall measurements and show that the films of all concentration have a negative Hall coefficient. In D.C measurement increase temperature leads to decrease the electrical resistance. The D.C conductivity of the composites increases with the increasing of the concentration of additive particles and temperature. The activation energy decreases for all composites with increasing the concentration of the additive particles.
... Show MoreAntioxidant status imbalance and inflammatory process are cooperative events involved in type 2 diabetes mellitus. This study aimed to investigate superoxide dismutase as a potential biomarkers of antioxidant imbalance, matrix-metaloprotinase-9, and interleukin -18 as biomarkers of inflammation in serum and to estimate the effects of other confounding factors gender, age and finally measuring the relation among the interested biomarkers.
This case - control study included 50 patients, and 45 of healthy subjects matched age –gender were also enrolled in this study as a control group. The focused  
... Show MoreUse of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show MoreIn this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)