The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreMost heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par
... Show MoreJPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
The theme of love has been and still is the interest of authors and writers for it is closely related to people’s lives. That great passion has helped them express genuine thoughts pertinent to that theme that has given rise to many debates, some are vague and others controversial. In his (strait is the gate), (La Porte étroite), André Gide has sought to shed light on his characters perspective of love and its relationship with sacredness and divine happiness. Indeed these characters have found often themselves restrained, chained and exhausted, by tough religious commands that have imposed on them spiritual commitments and duties too hard to break.
André Gide has revealed a protestant deviation from the perfection theme tha
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThis study aimed to analyze functional thinking style and its contribution to learn the accuracy of block and smash serve in volleyball among university students. The sample was composed of 120 students of the College of Physical Education and Sports Sciences of the University of Baghdad (academic year 2021/2022). The statistical analyses were carried out with the statistical software SPSS and correlation analyses were conducted. It was found that functional thinking style significantly contributed to learn the accuracy of block and smash serve in volleyball among university students. Therefore, it is necessary to intensify efforts to increase the level of functional thinking among university students, by adopting acad
... Show MorePreparation of Carboxy Methylated mPEG-Block-(4-Dodecyl Anilide) Copolymers and Their Visco Metric and Surface Tension Properties in THF
The concept of training is no longer traditionally understood Limited organize traditional training courses, but has become a strategic choice in the investment and development of human resources system, attic trying to find the answer to the core problem of the study which
is the extent to which the training process, the traditional form that meets the needs of the company the development of intellectual capital.This research aimstostatementof the impact dimensions the training process(training role, support or top management , training programs, modern technology)of the in components Intellectual Capital(Human Capital, Structural Capital, Customer Capital) and provide the top management of the Company for the development of sci
... Show MoreAbstract
Shorten the research problem that there is no system or model to evaluate the financial performance of the departments of municipalities where it is not possible for a person or institution both to know or to know their success in terms of the financial work of failure and where it is now than those without assessing the financial performed, authorized to be and necessities FATF is the financial performance assessment, which is the work unfinished aspects without Hence the work came in this study to study and diagnose and analyze financial data in a sample of municipal departments in order to develop a model to assess the financ