<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe investigation of determining solutions for the Diophantine equation over the Gaussian integer ring for the specific case of is discussed. The discussion includes various preliminary results later used to build the resolvent theory of the Diophantine equation studied. Our findings show the existence of infinitely many solutions. Since the analytical method used here is based on simple algebraic properties, it can be easily generalized to study the behavior and the conditions for the existence of solutions to other Diophantine equations, allowing a deeper understanding, even when no general solution is known.
Recently, research has focused on non-thermal plasma (NTP) technologies as a way to remove volatile organic compounds from the air stream, due to its distinctive qualities, which include a quick reaction at room temperature. In this work, the properties of the plasma generated by the dielectric barrier discharge (DBD) system and by a glass insulator were studied. Plasma was generated at different voltages (3, 4, 6, 7, 8 kV ) with a fixed distance between the electrodes of 5 mm, and a constant argon gas flow rate of (2.5) I/min. DBD plasma emission spectra were recorded for each voltage. The Boltzmann plot method was used to calculate the electron temperature in the plasma ( ), and the Stark expansion method was used to calculate the elec
... Show MoreWitnessing the global arena many changes in the political, economic, social, scientific and technological have left their mark on the world as a whole, these changes require necessarily Advancement of the profession of auditing, and improve their performance, especially after the mixer skepticism the health of approach and the method followed by a check in the major audit firms global view as for the external audit of an active role in providing services to members of the community in various sectors, were to be provide these services to the highest level of quality.To ensure the quality of the audit process to be a proper planning is based on a scientific basis to be the substrate a strong underlying different audit works, and if planni
... Show MoreThe objective of this study is to investigate the application of advanced oxidation processes (AOPs) in the treatment of wastewater contaminated with furfural. The AOPs investigated is the homogeneous photo-Fenton (UV/H2O2/Fe+2) process. The experiments were conducted by using cylindrical stainless steel batch photo-reactor. The influence of different variables: initial concentration of H2O2 (300-1300mg/L), Fe+2(20-70mg/L), pH(2-7) and initial concentration of furfural (50-300 mg/L) and their relationship with the mineralization efficiency were studied.
Complete mineralization for the system UV/H2O2/Fe+2 was achieved at: initi
... Show MoreRoald Dhal's is a prominent British short story writer who presented a fictional world full of contradictions and ironies. It is also full of double meanings where things are not what they appear to be and where meaninglessness is a prominent component. Dahl's world is also colored with blackness and grotesqueness; full of comedy that makes you shiver instead of laugh and characters who invite a sneak peek into a different side, a dark side of human nature. Dahl's themes are various and gripping but usually revolve around the triangle that frames his fiction: violence, humour, and absurdity. What seems to be a prominent and recurrent theme that intersects with every element in this triangle is revenge. In one story after another Dahl pre
... Show MoreThis paper deals with a preliminary survey helminth parasites of the black partridge. Francolinus francolinus arabistanicus in Baghdad area, middle of Iraq. It was found that the bird was infected with the cestodes Cotugnia digonopora and Raillietina tetragona with infection rates of 61.9% and 4.8% respectively, and the nematodes Heterakis gallinarum and Paroneoccrca rouss-lotti with infection rates of 4.8% and 19% respectively. Some important measurements, distribution and occurrence according host-sex of each parasite were provided along with some remarks on parasites biology.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More