The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreWe propose a new object tracking model for two degrees of freedom mechanism. Our model uses a reverse projection from a camera plane to a world plane. Here, the model takes advantage of optic flow technique by re-projecting the flow vectors from the image space into world space. A pan-tilt (PT) mounting system is used to verify the performance of our model and maintain the tracked object within a region of interest (ROI). This system contains two servo motors to enable a webcam rotating along PT axes. The PT rotation angles are estimated based on a rigid transformation of the the optic flow vectors in which an idealized translation matrix followed by two rotational matrices around PT axes are used. Our model was tested and evaluated
... Show MoreTexture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.
Objective: The evaluation of serum osteocalcin (OSN) for Iraqi infertile patients to see the effect of osteocalcin insufficiency, which may lead to a decreased level of testosterone production in males that may cause infertility. Methods: Forty two newly diagnosed infertile males age range (24–47) years and thirty two apparently healthy males as controls age range (25–58) years. Serum levels of testosterone (TEST), stimulating follicle hormone (FSH) and luteinizing hormone (LH), prolactin (PROL), osteocalcin OSN, and fasting blood sugar (FBS) were performed in both patients and controls. Estimation of serum OSN by Immulite1000 auto-analyzer, TEST, FSH, LH, PROL, and FBS by Immulite2000 auto-analyzer. Results: Infertile patients
... Show MoreThe aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN
Background: Selenium-73 with half- life of 7.15 hour emits β+ in nature and has six stable isotopes which are ( 74Se,76Se,77Se,78Se,80Se and 82Se ). Selenium-73 has many applications in technology and radioselenium compounds of metallic have found various applications in medicine. Objective: To make a comparison between different reactions that produced cross sections of Se-73 radioisotopes. Subjects and methods: The feasibility of the production of Selenium -73 via various nuclear reactions was investigated. Excitation functions of 73Se production by the reactions of 75As (p,3n), 169Tm( d,x), 74Se, natSe, natBr (p,x) , 75As (d,4n), natGe (3He,x), 70Ge (α, n), and 72Ge (α, 3n) and neutron capture were calculated using the avail
... Show MoreBackground: Selenium-73 with half- life of 7.15 hour emits β+ in nature and has six stable isotopes which are ( 74Se,76Se,77Se,78Se,80Se and 82Se ). Selenium-73 has many applications in technology and radioselenium compounds of metallic have found various applications in medicine.
Objective: To make a comparison between different reactions that produced cross sections of Se-73 radioisotopes.
Subjects and methods: The feasibility of the production of Selenium -73 via various nuclear reactions was investigated. Excitation functions of 73Se production by the re
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show More