In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression.
The particle-hole state densities have been calculated for 232Th in
the case of incident neutron with , 1 Z Z T T T T and 2 Z T T .
The finite well depth, surface effect, isospin and Pauli correction are
considered in the calculation of the state densities and then the
transition rates. The isospin correction function ( ) iso f has been
examined for different exciton configurations and at different
excitation energies up to 100 MeV. The present results are indicated
that the included corrections have more affected on transition rates
behavior for , , and above 30MeV excitation energy
We observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn this work, prepared new ligand[3- (1H-indol-3-yl) -2- (3-(4- methoxybenzoyl)thiouereido) propanoic acid](MTP) has been synthesized by reaction of 4-Methoxybenzoyl isothiocyanate with tryptophane(1:1), The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13C NMR spectra, Some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MTP)2] (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg), the proposed geometrical structure for all complexes were tetrahedral except copper complex has a square planer geometry around metallic ion
... Show Moreالمستخلص ورمى هذا البحث الى التعرف على الصورة الذهنية للنقابات المهنية لدى الجمهور المنتمي لها ويهدف هذا البحث لمعرفة الصورة الذهنية التي يحملها جمهور(المنتمي) للنقابات المهنية عن طريق التعامل المباشر مع نقاباتهم و معرفة مؤشرات تلك الصورة ومصادر تشكيلها اذا حددت الباحثة مشكلة بحثها بالتساؤل الرئيس : ( ما الصورة الذهنية للنقابات المهنية لدى جمهورها) والتعرف على صورة النقابات عند الجمهور المنتمي لها و
... Show MoreThe present paper aims at presenting a feminist reading of Shamela. It specifically seeks to show how the patriarchal mentality behind Shamela dismembers all aspects of the positive image of the woman in Pamela so that nothing remains in the public mind but the prevalent stereotypical image. The narrative in Pamela draws a positive picture of a truly pure, honest, moral woman; the narrative of Shamela redraws that picture by positing the stereotypical image of the woman as a lascivious temptress, false creature, immoral person, and shameless prostitute. This image is what patriarchy intends to endure as it has invented it long ago so that it continues to maintain its domination of society.
Background: The association between diabetes and inflammatory dental diseases had been studied extensively for more than 50 years. A large evidence base suggests that diabetes is associated with an increased prevalence, extent and severity of gingivitis and periodontitis and loss of teeth. Many patients do not aware that they are diabetic.Objectives:The aim of the current study was to assess a fast, non-invasive, safe procedure to screen for diabetes and its severity in dental clinics and to assess the change in blood glucose level before and after tooth extraction during periodontalResults: there were no significant differences between the blood samples collected before tooth extraction from finger puncture method (FPB) and the gingival
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More