The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images instead of huge images with the same parameters. This provides users in social media with efficient tools to search their images and establish a database or a collection of special images to their interests. Experiments using face detection and background notice based indexing techniques support the idea that the proposed algorithm achieves significantly better results in terms of computing cost. This technology will support control the explosion of media-rich content by offering users an efficient automated image indexing and retrieval tool for compressed images on the Internet
The elections of the Council of Representatives in Iraq are one of the manifestations of political participation, which makes it attracts the attention of researchers. Where Iraq witnessed in 2005 important political events in the Iraqi arena, a pluralist parliamentary elections or elections in Iraq by direct free election on January 30, the first almost half a century ago. On November 15 of the same year, Iraq adopted a permanent constitution for the country through a popular referendum.
This srudy aimed to use a new concentration from l\!J3T (Nitroblue tetrazolium) which using NADH stain ( by used eight different concentrations from (0.2% to 0.06% ).
That stain is a mitochondrial and cytoplasmic histochemical stain which gi ves more infom1ation about the metabolic activity of muscle fiber, so it is valuable in determining the types of muscle fibers and good fiber differentiation type {T) and type (TT) fibers), by reducing NBT in the location of enzyme and gives a blue color in different degrees according to the types of muscle fibers, and we noticed that the concentration 0.1% from NBT gives a good result and di
... Show MoreImage Fusion Using A Convolutional Neural Network
Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreExperts of Psychology and education emphasized that childhood is one of the most important stages in the formation of human personality, and the most influential in his public life, especially the stage in which he lives within his family, which must provide him with the requirements of healthy growth of physical, emotional, moral and social. Emotional-social connection of the child to his family, is especially important in determining the characteristics of his social character, in accordance with the norms and values prevailing in society. This requires the child to be cared for and cared for, and to deal with him in a healthy social manner. So as to achieve positive growth and harmony in the process of social control in internal
... Show MoreThe problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in c
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More