The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.
Research has included preparation of three of n Vthal acids Amec Bmentoj high of interaction vehicles Ortometta and bar aminophenol with phthalic anhydride was withdrawn water and ring closure of acids Alvthal AMEC prepared
In this research, new series of Furo-2-quinolone [FQ] compounds have been synthesized. These novel [FQ] compounds were prepared from coumarin derivatives (Furocoumarins: psoralen and isopsoralen).Identifications of these FQ compounds were performed by using infrared spectrum (I.R), Ultraviolet spectrum (U.V) and Nuclear Magnetic Resonance spectrum (H1-NMR) besides some physical data. The cytotoxic screening involves ;using HEP-2 cell line which gave differential responses against tested compounds : 4,6 Dimethyl furo[2, 3-g] coumarin (C1), 1-(2`, 4`, Dimethoxy benzylideneimino)-2,6-dimethyl Furo [2, 3-g] quinoline-2-one (C3) and the angular psoralen of the same derivative
... Show MoreIn our research novel schiff bases of imides moiety have been synthesized . Novel Schiff base derivatives of imides moiety have been synthesized by multistep reaction . First step involves prepare 2-amino -5-mercapto-1,3,4-thiadiazole (I) by the cyclization of thiosemicarbazide with carbon disulphide and anhydrous sodium carbonate in ethanol as a solvent . Then , compound (I) was reacted with phthalic anhydride in the presence of glacial acetic acid to give 2-(5-mercapto-1,3,4-thiadiazol-2-yl) isoindoline-1,3-dion (II).Compound (II)was heated with ethyl chloracetate in the presence of potassium carbonatproduced ethyl 2(5-(1,3-dioxoisoindoline -2-yl)-1,3,4-thiadiazole-2-yl thio) acetate (III).The reaction of compo
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreSome maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.