NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among other wavelet functions. The system was implemented using
MATLAB R2010a. The average improvement in term of PSNR between Haar and other
wavelet functions is 1.37dB
Background: Presence of maxillary sinus septa has been known to be a complicating factor for sinus elevation procedure and implant placement in posterior maxilla. The maxillary sinuses septa are thin walls of cortical bone inside the sinus. They vary in number, location, and height. This study aimed to discover the accuracy of Spiral Computed Tomographic Scan in evaluation the maxillary sinus septa (prevalence, location, height) in subjects with dentate, partially edentulous and completely edentulous maxilla. Material and method: This study included (267) subjects ranged from (20-70 years), (132) male and (135) female divided into three groups, (97) fully dentate group, (102) partially edentulous group and (68) completely edentulous group w
... Show MoreObjective: To compare two insertion techniques of intramedullary interlocking nails (medial parapatellar versus intrapatellar insertion) in patients with tibial fractures. Methodology: This study was performed at Al-Kindy Teaching Hospital from August 2020 until March 2022. All 32 patients with tibial fractures (29 males and 3 females) were included for tibial closed nail fixation and then followed up for 6 months. We categorized these patients into two groups; Group A (16 patients), those treated by medial parapatellar insertion of an interlocking nail, and Group B (16 patients) with transpatellar tibial nail insertion. All patients were treated by the same surgical team. Results: The range of movement in two weeks (from extension
... Show Moren this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best. The effect of temperature on the adsorption process was studied
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreThis study was carrid out to produce animal gelatin from chicken skin. Gelatin was prepared by the chemical method using HCl 2% and extraction at the temperature degree 70, 80, 90 c° and at the period of time 4, 6, 8 hours, calculated the yield, functional and sensory characteristics were measured at. The result also demonstrated that the produced gelatin have good functional properties in solubility, viscosity, gelling capacity, water absorpation, lipid binding, emulsification. viscosity was higher in gelatin prepared at 70 c° and period of extraction 8 hours and reached 1.0846 cp. Gelatin prepared were featured by highe gelling capacity at 1% for all extraction time periods. The produced gelatin was characterized by good sensory qual
... Show MoreThe results of the current study showed that the liver of H. javanicus appeared as large lobulated organ divided into six distinct lobes, that filled the cranial region and little extended to the middle region of abdominal cavity. On the other hand, liver of S. carolinensis laid against the diaphragm, occupied the cranial region of the abdominal cavity and consisted of five lobes. The liver is surrounded with a thin capsule of dense regular collagenous connective tissue and few numbers of smooth muscles fibers can be seen in the capsule that covered the squirrel liver. The liver parenchyma divided into a large number of interconnected hepatic lobules marked only by the abundant amount of connective tissue bordered the triads, and within the
... Show Moreتضمن البحث التعريف بالإمام البزازي، وحياته العلمية، ومشايخه، وتلامذته، ومؤلفاته، ووفاته، وأربعة مسائل مختارة من ترجيحاته في الحدود والجنايات، والإمام محمد بن محمد بن شهاب بن يوسف (ت827هـ)، يُكنَّى بالكَردَرِيِّ الحنفي الخوارزمي الشهير بالبزَّازي، ويُنسب إلى كَرْدَر، وقد عرض في كتابه كثيرًا من كتب الحنفية، وذكر الكثير من آراء علمائهم مع تعرضه لبعض آراء المذاهب الأخرى. ولم يعتمد على التعريفات اللغوية والاصط
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
This research deals with the relationship between television advertising and buying random cosmetics, where we find that TV ads influence on the purchasing behavior of women, has conducted research in the field on a sample of women in the University of Baghdad, was a random sample taken from 150 different women in the age and social levels educational and cultural students and employees and teachers in order to sample representative be for the research community, and designed a questionnaire for this purpose form as a tool to collect data and information search and analyzed they answered the sample surveyed using a statistical program (spss) to extract percentages And correlation coefficients and testing square Kay , The study found Of w
... Show More