In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MorePseudomonas aeruginosa readily binds to different kind of abiotic surfaces and form biofilm. The ability of the bacterial species to form biofilm onto polyvinyl chloride (PVC) is associated with several economic, health and environmental problems. The effect of kind of water on ability of this bacterium to form biofilm is scanty in literature. In present study, the ability of different environmental isolates of P. aeruginosa to form biofilm onto polystyrene microtiter plate was evaluated. Furthermore, the effect of waters that collected from different sources on biofilm formation of this bacterium onto PVC was studied. Spectrophotometric method was used to check the ability of bacteria to form biofilm and evaluated the role of waters onto a
... Show More
This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v
... Show MoreWater one of the most important sources Which is no doubt essential for life surviving, water is vital in many sectors of life e.g. ( agriculture, industrial, power and so many things can’t be restricted on the mentioned items, water has become major problem facing the world today. Competition over water resources between nations has made it as a vital commodity and a justification for waging wars against its neighbor’s countries, there are currently 263 rivers that either cross or demarcate international political boundaries. Geographically, Europe has the largest number of international basins (69), followed by Africa (59), Asia (57), North America (40), and South America (38).The absolute numbers of international basins, as well as t
... Show MoreA simple low-cost approach at various exposure times was utilized to generate cold plasma in the aim to fabricate AuNPs. UV-Visible spectra and X-ray diffraction were used to characterize the nanoparticles (XRD). Surface Plasmon resonance was observed in the synthesized AuNPs at 530, 540, and 533 nm. For all samples, the patterns of XRD show very intensive peaks implying the fcc crystalline structure of AuNPs. The average crystallite size of AuNPs is ranging between 20-30 nm. The observation of morphology by FESEM revealed the spherical formation of AuNPs. Doses of 100 and 200 ppm of AuNPs were adapted to investigate their effect on the blood-mixture with and without a 20-second of cold plasma exposure. The WBC components in the blood
... Show MoreBased on the theoretical review of researches and studies concerned with virtual teams in organizations, it was found that the role of virtual teams varies from case to another, and it may be positive or opposite. The purpose of the current research is to examine the role of virtual teams in the impact of cultural intelligence on the strategic excellence of Zain worldwide Group. An electronic questionnaire was designed through the (Google) and (Microsoft) forms, and distributed then on a sample of (146) participants with a high organizational level of the HRM departments within the group. The results showed that there was a positive moderator role of virtual teams in the relationship of cultural intelligence and strategic excellence
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
Illiteracy has spread in the last years, although it was eliminated in the 1980s. The return of illiteracy brings ignorance, illness, backwardness and regression among nations. It has taken many types, mainly alphabetical, scientific and computer illiteracy. Hence, the increasing nature of illiteracy has attracted the attention of governments and societies alike. This may touch the reality of societies starting with their youth unless those, who are in charge, will find workable solutions for the existing problems. The results of the study revealed that there is a real disaster awaiting the next generation after years of stray, and ignorance of the people in charge who are too engaged in getting their privileges to care about this proble
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More