Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zigzag scan is applied on the quantized coefficients and the output are encoded using DPCM, shift optimizer and shift coding for DC while adaptive RLE, shift optimizer then shift coding applied for AC, the other subbands; LH, HL and HH are compressed using the scalar quantization, Quadtree and shift optimizer then shift coding. In this paper, a new flipping block with an adaptive RLE is proposed and applied for image enhancement. After applying DCT system and scalar quantization, huge number of zeros produced with less number of other values, so an adaptive RLE is used to encode this RUN of zeros which results with more compression.Standard medical images are selected to be used as testing image materials such as CT-Scan, X-Ray, MRI these images are specially used for researches as a testing samples. The results showed high compression ratio with high quality reconstructed images
According to different types of democracy Indexes, hybrid regimes or those in the gray zone, make up the majority of regime transformations in the third wave of democracy. However, after nearly three decades, conceptual confusion about hybrid regimes persists and grows, while obstructing the accumulation of knowledge about the nature of hybrid regimes. This leads to significant political repercussions for democratization. This Paper attempts to provide a clearer view of different and overlapping concepts and classifications in this complex field, and sustain development in literature on democratic transformation. To achieve this, we followed an approach based on the classification of concepts and terms in three distinct categories, b
... Show MoreData-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
This paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreThis researd exhibit's a method to determine the change in Gibbs function,(enthai py,entropy. and specific heat capacity) tor monovariant heterogeneous equilibria .The thermodynamical quan.tities were obtained jndirectly with m the measurment of temperature dependent on eql,lilibrium system.
The effects of nutrients and physical conditions on phytase production were investigated with a recently isolated strain of Aspergillus tubingensis SKA under solid state fermentation on wheat bran. The nutrient factors investigated included carbon source, nitrogen source, phosphate source and concentration, metal ions (salts) and the physical parameters investigated included inoculum size, pH, temperature and fermentation duration. Our investigations revealed that optimal productivity of phytase was achieved using wheat bran supplemented with: 1.5% glucose. 0.5% (NH4)2SO4, 0.1% sodium phytate. Additionally, optimal physical conditions were 1 × 105 spore/g substrate, initial pH of 5.0, temperature of fermentation 30˚C and fermentation dura
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More