Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurrence through the sub intervals between the range 0 and 1. Finally, the stream of compressed tables is reassembled for decompressing (image restoration). The results showed a compression gain of 10-12% and less time consumption when applying this type of coding to each block rather than the entire image. To improve the compression ratio, the second approach was used based on the YCbCr colour model. In this regard, images were decomposed into four sub-bands (low-low, high-low, low-high, and high-high) by using the discrete wavelet transform compression algorithm. Then, the low-low sub-band was transmuted to frequency components (low and high) via discrete wavelet transform. Next, these components were quantized by using scalar quantization and then scanning in a zigzag way. The compression ratio result is 15.1 to 27.5 for magnetic resonance imaging with a different peak signal to noise ratio and mean square error; 25 to 43 for X-ray images; 32 to 46 for computed tomography scan images; and 19 to 36 for magnetic resonance imaging brain images. The second approach showed an improved compression scheme compared to the first approach considering compression ratio, peak signal to noise ratio, and mean square error.
Action films employ many artistic and literary elements that contribute greatly to building the general meaning of the film and push the wheel of the film forward. The element of mystery and suspense is used as two basic elements in action films. The cinematic language in action films depends on global coding, which is not models as it might be. It is based on logic, rather as units that aspire to morphology and not their homogeneity as the physical sense, but as the logical harmony of interpretive authority and enlightenment and in action films as a field of communication and a field in its origin in which the signifier contrasts with the perceptions of the meaning and in it takes a certain number of units preventing each other and thro
... Show More
Regression testing is a crucial phase in the software development lifecycle that makes sure that new changes/updates in the software system don’t introduce defects or don’t affect adversely the existing functionalities. However, as the software systems grow in complexity, the number of test cases in regression suite can become large which results into more testing time and resource consumption. In addition, the presence of redundant and faulty test cases may affect the efficiency of the regression testing process. Therefore, this paper presents a new Hybrid Framework to Exclude Similar & Faulty Test Cases in Regression Testing (ETCPM) that utilizes automated code analysis techniques and historical test execution data to
... Show MoreThe demand for electronic -passport photo ( frontal facial) images has grown rapidly. It now extends to Electronic Government (E-Gov) applications such as social benefits driver's license, e-passport, and e-visa . With the COVID 19 (coronavirus disease ), facial (formal) images are becoming more widely used and spreading quickly, and are being used to verify an individual's identity, but unfortunately that comes with insignificant details of constant background which leads to huge byte consumption that affects storage space and transmission, where the optimal solution that aims to curtail data size using compression techniques that based on exploiting image redundancy(s) efficiently.
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreInthisstudy,FourierTransformInfraredSpectrophotometry(FTIR),XRay Diffraction(XRD)andlossonignition(LOI),comparativelyemployedtoprovideaquick,relativelyinexpensiveandefficientmethodforidentifyingandquantifyingcalcitecontentofphosphateoresamplestakenfromAkashatsiteinIraq.Acomprehensivespectroscopicstudyofphosphate-calcitesystemwasreportedfirstintheMid-IRspectra(4004000cm-1)usingShimadzuIRAffinity-1,fordifferentcutsofphosphatefieldgradeswithsamplesbeneficiatedusingcalcinationandleachingwithorganicacidatdifferenttemperatures.Thenusingtheresultedspectratocreateacalibrationcurverelatesmaterialconcentrationstotheintensity(peaks)ofFTIRabsorbanceandappliesthiscalibrationtospecifyphosphate-calcitecontentinIraqicalcareousphosphateore.Theirpeakswereass
... Show MoreMany image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o
... Show MoreThe exchange rate is the backbone of any economy in the world, whether developed or developing, where most countries adopted many policies, in order to ensure the stability of the exchange rate of the currency, because of its importance as a link between the local economy and the others ,And it contribute in the achievement of internal and external balance and despite the many different factors that affect it, but there is wide consensus on the effectiveness of the role of spending and the currency window in the exchange rate of the Iraqi dinar, especially in the Iraqi economy, effectiveness As the increase in government spending lead to an increase in the supply of money and increase domestic demand and high pr
... Show MoreFingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show MoreThe objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show More