In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-mean-square difference (PRD %), energy retained (Er) and Peak Signal to Noise Ratio (PSNR). Based on testing results, a comparison between the three techniques is presented. CR in the three techniques is the same and has the largest value in the 2nd level of 3-D. The hybrid technique has the highest PSNR values in the 1st and 2nd level of 3-D and has the lowest values of (PRD %). so, the 3-D 2-level hybrid is the best technique for image compression.
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreComplexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4- thiadiazole-2-yl)phenyl) thiourea have been prepared and characteized by elemental analysis, Ff-[R, and u.v./ visible spectra moreover, determination of metal content M%o by flame atomic absorption spectroscopy, molar conductance in DMSO solution and magnetic moments (peffl. The result showed that the ligand (L) was coordinated to Mn*2, Ni*2, Ct*2,2n*2,Cd*2, and Hg*2 ions through the nitrogen atoms and sulpher atoms. From the result obtained, rhe following general formula [MLClz] has been given for the prepared complexes with an octahedral geometry around the metal ions for all complexes. where M= Mn*2, Ni*2, cu*2, zn*z, cd*z, and Hg*2 l= l-phenyl-3-(2-(5-(phenyl amino)-1, 3,
... Show MoreMulti-belled piles are piles with enlarged ends; these piles have one or further bells at the lower third part of the pile. These piles are suitable for many soils with problems such as softening clay, the variation of groundwater table, expansive soils, black cotton soil, and loose sand. The current study reviewed the behavior of belled piles in multi-layer soils subjected to axial compression and pullout loading. The review covered the experimental and theoretical works on belled piles in multi-layered soils. These piles were subjected to static and dynamic loadings in compression and pullout cases. Most theoretical results focused on software such as PLAXIS 3D. The axial load applied on the piles comes from the upper
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreThe reaction of 2-amino-benzothiazole with bis [O,O-2,3,O,O – 5,6 – (chloro(carboxylic) methiylidene) ] – L – ascorbic acid (L-AsCl2) gave new product 3-(Benzo[d]Thaizole-2-Yl) – 9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine – 2,4 (3H) – Dicarboxylic Acid, Hydro-chloride (L-as-am)), which has been insulated and identified by (C, H, N) elemental microanalysis (Ft-IR),(U.v–vis), mass spectroscopy and H-NMR techniques. The (L-as am) ligand complexes were obtained by the reaction of (L-as-am) with [M(II) = Co,Ni,Cu, and Zn] metal ions. The synthesized complexes are characterized by Uv–Visible (Ft –IR), mass spectroscopy molar ratio, molar conductivity, and Magnetic susceptibility techniques. (
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreTwo new ligands Na2[ H3B (BDIA)].0.05H2O (L1)(BDIA = 1-Boranyl-2,3-
Dihydro-1H-Indol-3-yl)]Acetic Acid and Na3[H2B(BDIA)2].0.3H2O.0.3CH3Ph (L2)
were synthesized by reaction of NaBH4 with indole -3- acetic acid (IAA) . The
coordination properties of ligands were studied with Co(II) , Ni(II) , Cu(II) and
Pt(IV) ions. Characterization and structural aspects of the prepared compounds were
elucidated by 1HNMR, FTIR electronic spectra, magnetic susceptibility, elemental
and metal analysis, thermal analysis (TG & DTG) and conductivity measurements.
The obtained data for metal complexes suggested square planar geometry for
copper complexes, octahedral geometry for nickel and platinium complexes and
tetrahedral geom
The corrosion of carbon steel in single phase (water with 0.1N NaCl ) and two immiscible phases (kerosene-water) using turbulently agitated system is investigated. The experiments are carried out for Reynolds number (Re) range of 38000 to 95000 corresponding to rotational velocities from 600 to 1400 rpm using circular disk turbine agitator at 40 0C. In two-phase system test runs are carried out in aqueous phase (water) concentrations of 1 % vol., 5 % vol., 8% vol., and 16% vol. mixed with kerosene at various Re. The effect of Reynolds number (Re), percent of dispersed phase, dispersed drops diameter, and number of drops per unit volume on the corrosion rate is investigated and discussed. Test runs are carried out using two types of
... Show More