One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThe distortion, which occurs to the image often affects the existing amount of information, weakens its sharpness, decreases its contrast, thus leads to overlapping details of the various regions, and decreases image resolution. Test images are used to determine the image quality and ability of different visual systems, as we depended in our study on test image, half black and half white. Contrast was studied in the petition so as to propose several new methods for different contrasts in the edge of images where the results of technical differences would identify contrast image under different lighting conditions.
The liver diseases can define as the tumor or disorder that can affect the liver and causes deformation in its shape. The early detection and diagnose of the tumor using CT medical images, helps the detector to specify the tumor perfectly. This search aims to detect and classify the liver tumor depending on the use of a computer (image processing and textural analysis) helps in getting an accurate diagnosis. The methods which are used in this search depend on creating a binary mask used to separate the liver from the origins of the other in the CT images. The threshold has been used as an early segmentation. A Process, the watershed process is used as a classification technique to isolate the tumor which is cancer and cyst.
 
... Show MoreIn this paper, we proposed a modified Hestenes-Stiefel (HS) conjugate
gradient method. This achieves a high order accuracy in approximating the second
order curvature information of the objective function by utilizing the modified
secant condition which is proposed by Babaie-Kafaki [1], also we derive a nonquadratic
conjugate gradient model. The important property of the suggestion
method that is satisfy the descent property and global convergence independent of
the accuracy of the line search. In addition, we prove the global convergence under
some suitable conditions, and we reported the numerical results under these
conditions.
The detection of diseases affecting wheat is very important as it relates to the issue of food security, which poses a serious threat to human life. Recently, farmers have heavily relied on modern systems and techniques for the control of the vast agricultural areas. Computer vision and data processing play a key role in detecting diseases that affect plants, depending on the images of their leaves. In this article, Fuzzy- logic based Histogram Equalization (FHE) is proposed to enhance the contrast of images. The fuzzy histogram is applied to divide the histograms into two subparts of histograms, based on the average value of the original image, then equalize them freely and independently to conserve the brightness of the image. The prop
... Show MoreIn this study, the mechanical properties of an epoxy and unidirectional woven carbon with fiberglass composite were experimentally investigated. When preparing the composite samples, American Society for Testing and Materials (ASTM)standard was used. Tensile, impact and flexural test were conducted to investigate the mechanical properties of the new produced epoxy Unidirectional Woven Carbon and Epoxy Fiberglass composites. The outcome showed that the strength of the produced samples increased with the increase in the number of unidirectional woven carbon layers added. Two methods were utilized: (1) woven carbon composite with glass fiber (2) woven carbon composite). The two methods of composite were compared with each other. The resul
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More