The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe research aims to diagnose the causes of the phenomenon of Marketing deception catalog, which is now deployed in the Iraqi market and related to producers and marketers, consumers, regulators and other institutions) and their impact in the areas of prejudice to the consumer protection (product and signifying specifications, price, advertising, packaging), as well as identify differences in the sample responses according to personal variables, it has been the adoption of the resolution as a tool to collect data and information through a sample survey of consumer opinions totaling 108 people in shopping centers in the province of Baghdad and in the Karkh and Rusafa, It was the use of methods selected statistical represented by the arith
... Show MoreBACKGROUND: Vaccine hesitancy and reluctant had an important obstacle in achieving protection and population immunity against coronavirus disease 19 (COVID-19). It is essential to achieve high COVID-19 vaccination acceptance rates among medical students and health care workers to provide recommendations and counseling vaccine hesitant population. AIM: This study aims to identify level of COVID-19 hesitancy, attitude, knowledge, and factors that affect vaccination decision. MATERIALS AND METHODS: A cross-sectional study was done among medical students in Al-Kindy College of Medicine, University of Baghdad, Baghdad, Iraq. Data collection was done through an online Google Forms questionnaire during 2021 from 810 medical students.
... Show MoreIn this work various correlation methods were employed to investigate the annual cross-correlation patterns among three different ionospheric parameters: Optimum Working Frequency (OWF), Highest Probable Frequency (HPF), and Best Usable Frequency (BUF). The annual predicted dataset for these parameters were generated using VOCAP and ASASPS models based on the monthly Sunspot Numbers (SSN) during two years of solar cycle 24, minimum 2009 and maximum 2014. The investigation was conducted for Thirty-two different transmitter/receiver stations distributed over Middle East. The locations were selected based on the geodesic parameters which were calculated for different path lengths (500, 1000, 1500, and 2000) km and bearings (N, NE, E, S
... Show MoreBackground: Smoking is considering a major risk factor for development and progression of periodontal disease. Investigations regarding the association between smoking and periodontal disease have consistently demonstrated negative periodontal effects and greater probabilities of established periodontal disease among smokers in comparison with non smokers. The purpose of this study was to evaluate the effects of smoking on periodontal health status and on the salivary levels of alkaline phosphatase (ALP), lactate dehydrogenase (LDH) and creatine kinase (CK), and to correlate the clinical parameters of periodontal health with the biochemical findings in smokers and non-smokers. Materials and methods: Unstimulated saliva sample was collected
... Show MoreThe chemical composition of wastes of pressed grapes and found that the main components of wastes of pressed grapes, represented by the percentage of moisture was 6.47%, and the proportions are 3.71%. Either carbohydrates amounted to 85.77 %, either in fat models using petroleum ether Petroleum ether) was the increase of 0.27%. estimated the percentage of ash in the sampls was 3.78%, either fiber reached 69.47 %,, in addition to the test extracts towards the growth of seven types of bacteria, which included Bacillus subtilis, Bacillus cereus, Bacillus stearothermophilus, Escherishia coli, Staphylococcus aureus, Salmonella typhimurium and Pseudomonas fluorescens and yeast Candida albicans and Kluyveromyces marxianus, ( diffusion method ).
... Show More