The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.
Abstract
The current research aims to know the reality of the research's coefficients, to know correlation and effectiveness between the organizational Agility and high performance . The current research has been applied on the official banks , including a sample of senior administration members (120) ; besides , the research has used questionnaire that being considered as the main tool for gathering information and data . It includes 59 questions in addition to the personal interviews program as to support the questionnaire and to fulfill a great deal of reality. It has been anal
... Show MoreObjective : Sciatic nerve block (popliteal approach) and femoral N block is a new technique other than general anesthesia in below knee surgery because it provides adequate muscle relaxation, with good intraoperative and post-operative analgesia. Nefopam is non opioid, non-respiratory depressant and non-sedative was mixed with local anesthetics drug to study the effects. This study was done to compare the onset and duration of sensory and onset time and duration of action of motor block following administration of either bupivacaine alone with administration of bupivacaine and Nefopam in patients undergoing below knee lower limb surgeries under ultrasound guided regional anesthesia.
Methods: 100 patients with American society of anest
In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show MoreThe discourse surrounding lingual sovereignty within the African postcolonial context is profoundly intertwined with the fabric of cultural identity and self-determination. Language serves not merely as a conduit for communication but as a repository for a people's collective consciousness, encapsulating their traditions, thoughts, and perspectives. In the realm of postcolonial literature, this dialogue often grapples with the paradox of expressing indigenous narratives through the linguistic tools of former colonizers. Chinua Achebe's seminal work, "Things Fall Apart," exemplifies this conundrum, artfully weaving the orature and culture of Umuofia within the English language. Achebe's choice to write in English—a language imposed upon hi
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreSpraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
In networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show More