The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.
The purpose of this research shed light on the analysis of the relationship between training needs and organizational commitment and the role of a variable contract psychological, and start search of a dilemma thought provoking fundamental questions revolve around the search was the answer to all those questions of tricks theoretical framework to the variables of research first and test models of the relationship and impact secondly During six hypotheses major, The objective of the research the impact of the factors that affect training needs in organizational commitment center the psychological contract, and applied research on a sample of 100 individuals working in the engineering department and maintenance at the D
... Show MoreThe chemical composition of wastes of pressed grapes and found that the main components of wastes of pressed grapes, represented by the percentage of moisture was 6.47%, and the proportions are 3.71%. Either carbohydrates amounted to 85.77 %, either in fat models using petroleum ether Petroleum ether) was the increase of 0.27%. estimated the percentage of ash in the sampls was 3.78%, either fiber reached 69.47 %,, in addition to the test extracts towards the growth of seven types of bacteria, which included Bacillus subtilis, Bacillus cereus, Bacillus stearothermophilus, Escherishia coli, Staphylococcus aureus, Salmonella typhimurium and Pseudomonas fluorescens and yeast Candida albicans and Kluyveromyces marxianus, ( diffusion method ).
... Show MoreType 2 diabetes mellitus (T2DM) is a chronic disorder that is a serious health concern all over the globe, it is linked to Interleukin-10 (IL-10) single nucleotide polymorphisms (SNPs) at the promoter region. On the other hand, diabetes influences the cellular and humoral immunity predisposing the patient to a variety of opportunistic parasites one of them is Toxoplasma gondii (T. gondii), which may infect any nucleated cell, including pancreatic cells. The purpose of this research was to explore the association of IL-10 genetic polymorphisms with T2DM and latent toxoplasmosis among Iraqi patients with T2DM. Fifty-five and fifty-eight venous blood samples were taken from T2DM patients and age-matched non-diabetic person
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreIn this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show More