In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThis research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narr
... Show MoreIn this work, the fractional damped Burger's equation (FDBE) formula = 0,
This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIn this paper the definition of fuzzy anti-normed linear spaces and its basic properties are used to prove some properties of a finite dimensional fuzzy anti-normed linear space.
The Iraqi-Kuwaiti relations represent a great issue for the Arab-Arab relations. This relation is characterized by specificity for the tension since the foundation of the State of Kuwait until late. There are many factors that prevented the fulfillment of the aspiration towards the development of the relations, perhaps the most important of which is the issue of Mubarak Great Port which is a difficult issue as far as the relation between the two states is concerned. One year after Iraq put the cornerstone of the Great Faw Port. This is considered as the most important hurdle in front of constructing the relations with the neighbor Kuwait
تُعد فكرة الذكاء الاصطناعي من العلوم الحديثة التي ارتبطت بالإنسان منذ العقود الخمسة الماضية، وأصبحت السياسة الرقمية جزءاً لا يتجزأ من المجتمع لكونها تُستخدم في أغلب مجالات حياة الانسان. وهذا ما شجع صانعوا السياسات التكنولوجية الجديدة في التفكير بكيفية توظيفها لخدمة مصالحهم العليا السياسية والعسكرية، للتعزيز من قوتهم ونفوذهم، وغاضين النظر عن بذل الجهود للتفكير في تنظيمهم للذكاء الاصطناعي التوليدي، ووضعه
... Show Moreيعد الذكاء الاصطناعي من العلوم الحديثة التي ارتبطت بالإنسان منذ العقود الخمسة الماضية، ولتصبح السياسة الرقمية الاقتصادية جزءاً لا يتجزأ من المجتمع، لكونها خرقت أغلب مجالات حياة الانسان. وهذا ما شجع صانعوا السياسات التكنولوجية الجديدة في التفكير بكيفية توظيفه لخدمة مصالحهم الاقتصادية العُليا، بغض النظر عن بذل الجهود للتفكير في مصالح الانسان الاقتصادية وتنظيمهم ومراقبة الذكاء الاصطناعي التوليدي. لقد أيقن
... Show More