Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurrence through the sub intervals between the range 0 and 1. Finally, the stream of compressed tables is reassembled for decompressing (image restoration). The results showed a compression gain of 10-12% and less time consumption when applying this type of coding to each block rather than the entire image. To improve the compression ratio, the second approach was used based on the YCbCr colour model. In this regard, images were decomposed into four sub-bands (low-low, high-low, low-high, and high-high) by using the discrete wavelet transform compression algorithm. Then, the low-low sub-band was transmuted to frequency components (low and high) via discrete wavelet transform. Next, these components were quantized by using scalar quantization and then scanning in a zigzag way. The compression ratio result is 15.1 to 27.5 for magnetic resonance imaging with a different peak signal to noise ratio and mean square error; 25 to 43 for X-ray images; 32 to 46 for computed tomography scan images; and 19 to 36 for magnetic resonance imaging brain images. The second approach showed an improved compression scheme compared to the first approach considering compression ratio, peak signal to noise ratio, and mean square error.
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show MoreThe concept of TQM is based on one of the concepts that combine administrative and innovative methods. The aim of the research is to demonstrate the dimensions of TQM in enhancing the satisfaction of the taxpayers through a survey of a sample of officials in the General Authority for Taxation and 50 officials. In the collection of data and information, and the results were analyzed using the SPSS program to find the most important compounds and factors in he method of analysis.
The research problem was represented by the non-application of the General Authority for Taxation to the entrances and modern practices in the administrative work. The results of some of the complications that accompany the tax accounting process, which af
... Show MoreConclusion :
The conflict between the fundamentalist and news theory in the methodology that each of the two schools pursued with the Twelver Shi'a Imamiyyah in deriving the legal rulings from the sources of legislation, especially in the second source, which is the noble hadith and narration after the Holy Qur’an, which is the first source has gone through multiple and complex stages that led This struggle to excess, stress, exaggeration, negligence, neglect and indulgence by each of the two schools in dealing with the noble hadith and narration and in the manufacture of rules and laws and fundamentalist and juristic theories of the process of jurisprudential development of legal rulings where every school believed and proceed
... Show MoreThis research aims to:
1 – Make a proposed module for (aesthetics) for the second stage - Department of Art Education under education theories.
2 - Verification from the effect of the proposed module on student achievement and motivation towards learning aesthetics material.
To verification the second goal we wording these two hypotheses:
1- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group ) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the achievement test for the Aesthetics material.
2- There are no individual differences with statistically signifi
Research on the role of organizational change in easing the organizational conflict focuses for being one of the important topics and relatively modern and which have a significant impact on the future of organizations, so this study was to identify the relationship and the impact of organizational change and of deportation (technological, organizational structure, human resources, the change in the task) at the organizational conflict in the Earth company link Iraq, in order to reach the goals of the research, it has been the development of a questionnaire distributed to a random sample of (100) composed employees from managers and heads of departments and the people and staff at the Earth company link Iraq, the study found: the
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
This study aims to isolate the pathogenic yeasts from genital tract and investigate their relationship with the age .The results clarified that the most pathogenic yeast isolated from genital tract was Candida albicans , also the results of C.albicanas isolates susceptibility test, to different antifungal revealed that they were sensitive to Miconazole, Ketoconazole and Clotrimazol and were resistant to Nystatin and Grisofulvin. The study of relationship of vaginal infection with the age showed that the incidence of infection with Candida was high among females age group (19-39 years).
In this study, phytoplankton density, chlorophyll-a, and selected physico- chemical parameters were investigated in Erbil wastewater channel. The surveys were carried out monthly from May 2003 to April 2004. Samplings were established on three sites from headwaters to the mouth. The results showed that pH was in alkaline side of neutrality, with significant differences (P<0.05) between sites 1 and 3. TSS concentration decreased from site 1 toward site 2 (mean value, 80.15 to 25.79 mg.l-1). A clear gradual increase in mineral content (TDS) observed from site one of the channel towards the mouthpart. Soluble reactive phosphate has a concentration maximum mean value reached 48.4 µg.l-1 which is recorded in site 2. A high positive relat
... Show MoreThe study sought to highlight the importance of applying the administrative control procedures which play an important role in assessing the performance of the employees of the tax administration and specifically the companies department by setting the standards and objectives of the department on the basis of which in the implementation of its work and identify deviations and errors and find appropriate solutions and evaluate the results according to appropriate solutions, The study of the problem of research, namely the extent to which the tax administration applied to the administrative control procedures in view of its importance in evaluating the performance of its employees and the extent of their application to the legislations an
... Show More
Abu Al-Ala Al-Ma’arri is a linguist and writer who showed his prowess in poetry, so he had poetry collections, including “The ulna fell,” which is one of the books that attracted the attention of scholars such as (Tabrizi, Al-Khwarizmi, Al-Bateliusi and Al-Zamakhshari) .
To explain his language in it, the investigators’ hands finally revealed an explanation of this book, which was the work of Abu Al-Ala Al-Ma’arri himself. Those who studied the Divan (The Zind) and its explanations or the character and language of Al-Ma’arri did not pay any attention to it. Therefore, I made this research a continuation of those efforts, using semantic research as a means of revealing Al-Maarri's ef
... Show More