Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Differential pulse code modulation (DPCM) and pixel-based techniques, where the spatial domain is exploited to compress images efficiently in terms of compression performance and preserving quality. The new pixel-based method overcomes predictive coding constraints with fewer residues and higher compression ratios.
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Amino acids were analyzed in stomach regions of males & females of Felis catus (Domestic Cat) & Sciurus carolinesis (Eastern Gray Squirrel ), where it was stated that there are (18) amino acids as following : Aspartic acid (Asp), Glutamic acid (Gla), Serine (Ser), Arginine (Arg), Aspargine ( Asn), Cysteine (Cys), Alanine (Ala), Proline (Pro), Glyscine (Gly), Threonine (Thr), Tyrosine (Tyr), Valine (Val), Methionine (Met), Histidine ( His), Isoleucine (ile), Leucine (leu), Phenylalanine (Phe ) and Lysine (lys). Results have shown there are significant differences in concentration of amino acids between different region of stomach between males & females of Felis catus in part and between males & females of Sciurus carolinesis (Eastern Gray S
... Show MoreImage Fusion Using A Convolutional Neural Network
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreVitamins play an important role in the human health, and thus they are the kind of major nutrients in the body. Chemical products perform numerous physiological functions and can jeopardize health jointly in their absence and surplus. Therefore, it is necessary to establish methods for observation vitamin levels in various molds. In this review paper, the most methods of determination used are high performance liquid chromatography (HPLC), spectrophotometric and potentiometric techniques by listed the value of : slope, linear range, correlation coefficient, detection limit, the max of wavelength and PH and compared with these methods.