Database management system is important and fundamental at present. Access databases are important and efficient storage tools. In this system, a database management system is designed and built to fulfill the requirement of the Legal Affairs Department-Investigative Committees Division-University of Diyala. The database was built using Microsoft Access databases, and the code was built using the C # programming language. This system is designed to be easy to handle for any user as an example of (Google material design) technology for the purpose of increasing interaction between the user and the program. It also contains an alert system in the event of the expiration of the investigative commission period. In this application you can easily search for any committee and its details. It also provides statistics for committees that were formed during the year or a specific month or period. It also contains reports for the purpose of printing results or saving them in various formats (PDF-WORD-EXCEL), which facilitates its compatibility with most office programs. In addition, it has a system for data protection and preservation from any unauthorized person.
The main aim of this study is to decrease the amount of storage as much as possible and the decoded image seen on the monitor should be as close as possible to the original image. The main goal of this study is to design a fully hybrid system for medical image compression. For this purpose, a hybrid techniques were used to enhance the compression performance, decreasing the computational complexity level and raising the CR (Compression Ratio, the proposed system is adopted on these tools: to design a new fully hybrid image compression system to compress a medical image (Brain Tumour disease type). Furthermore, a new reliable algorithm was proposed in order to identify the ROI (Region of Interest) and NROI (Non-Region of Interest) before compression process. In addition, this algorithm has less computational complexity and efficient, also develop new algorithms to compress the ROI and NROI regions. The first region, ROI, is compressed by cascading of SPIHT and BAT algorithms. Meanwhile, the second region (NROI) is compressed by the 2D-DWT algorithm, finally to design a new coding system by mixed the RLE (Run-Length Encoding) and Huffman coding algorithms to improve the CR. The results indicate that the SPIHT-BAT algorithm has increase the compression ratio better than SPIHT. Furthermore, the result of ROI region better than the result of NROI region. While the result of coding when used (RLE- Huffman) algorithm better than the result when used (RLE) alone or Huffman algorithm. The different parameters of compression process indicate that the proposed system is better than that of Traditional systems that described in literature.
Digital technologies grow more rapidly; information security threats are becoming increasingly dangerous. Advanced and various cyber-attacks and security threats, like targeted emails, and information exploitation, pose a critical threat that basically undermines our trust in the digital society. Rivest cipher 4 (RC4) algorithm is a significant cipher of a stream that could be utilized with protocols of the internet, the advantage of the RC4 algorithm is that it is simple and effective. There are several weak, especially after the pseudo-random generation algorithm (PRGA), PRGA's initially 256 rounds (the amount of the RC4 permutation). Several modified RC4 studies have been published thus far, however, they all face either standard privacy or achievement evaluation issues. This paper proposes a new RC4 algorithm that is based on the user's retina (RC4-Retina), which has solved both of these weak points it was indicated in the standard RC4 algorithm. The novelty of retina key scheduling algorithm (RKSA), which is generated by relying on the user's retina of the algorithm will modify the matrix of permutation used to configure the keys. The efficiency of the improved algorithm was measured by depending on the average security of ciphertext of different keys and different messages, results were good compared to the standard algorithm.
The world is entering into the era of Big Data where computer networks are an essential part. However, the current network architecture is not very convenient to configure such leap. Software defined network (SDN) is a new network architecture which argues the separation of control and data planes of the network devices by centralizing the former in high level, centralised devices and efficient supervisors, called controllers. This paper proposes a mathematical model that helps optimizing the locations of the controllers within the network while minimizing the overall cost under realistic constrains. Our method includes finding the minimum cost of placing the controllers; these costs are the network latency, controller processing power and link bandwidth. Different types of network topologies have been adopted to consider the data profile of the controllers, links of controllers and locations of switches. The results showed that as the size of input data increased, the time to find the optimal solution also increased in a non-polynomial time. In addition, the cost of solution is increased linearly with the input size. Furthermore, when increasing allocating possible locations of the controllers, for the same number of switches, the cost was found to be less.
Most of the AMBTC-based RDH (absolute instantaneous block truncation) schemes Cannot be decrypted because AMBTC, which is unknown to most device. Also, some of the RDH methods based on AMBTC. But the load capacity obtained is low. For this purpose, in this work, a scalable RDH scheme based on AMBTC was introduced from the AMBTC zip code. In contrast to the decoder-based AMBTC-based RDH methods that are only able to achieve a constant payload for adjust the audio. Due to its advantages, sound pressure has attracted a great deal of attention in the last 20 years. The main developments concern transmission requirements and storage capacity. The need for high-quality audio data has been increased due to sudden improvements in computer manufacturers and technologies. Therefore, the developments include speech compression technologies, in which the two compression classes are lossless. This paper aims to review techniques for specification compression methods using AMBTC (a momentary absolute block truncation notation based ) method, and to summarize their importance and uses.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.