Preferred Language
Articles
/
HxYII4cBVTCNdQwCGjpB
A POWERFUL AUTOMATED IMAGE INDEXING AND RETRIEVAL TOOL FOR SOCIAL MEDIA Sample
...Show More Authors

The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images instead of huge images with the same parameters. This provides users in social media with efficient tools to search their images and establish a database or a collection of special images to their interests. Experiments using face detection and background notice based indexing techniques support the idea that the proposed algorithm achieves significantly better results in terms of computing cost. This technology will support control the explosion of media-rich content by offering users an efficient automated image indexing and retrieval tool for compressed images on the Internet

Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
KNOWLEDGE MANAGEMENT AND MEDIA MANAGEMENT
...Show More Authors

To track scientific developments and achievements, for example, that (achieved) after the Second World War until this moment, make each of us in absolute amazement. He invented the computer, discovered the genetic factor (DNA), and discovered the drawing of the human genetic map, going up to the moon, penetrating outer space by satellites, getting close to distant planets, producing jet planes, microprocessors, and lasers, in addition to enabling a person to create a layer of The material is extremely thin and extremely imaginative. It has also become possible for a person to "dig lines that do not exceed 20 billion meters of thickness." The human being was also able to collect things an atom and build an efficient and high-precision con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Suggested Index for studying violent by Environment and Psychology components among Collegian students at a sample in Baghdad City
...Show More Authors

Objective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More
Publication Date
Thu Aug 16 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Social Interaction of Langauge in a Comic Series: A Sociolinguistic Study
...Show More Authors

DBNRAHA Hameed, IJRSSH PUBLICATION, 2018

View Publication
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE SOCIAL INTERACTION OF LANGUAGE IN A COMIC SERIES: A SOCIOLINGUISTIC STUDY
...Show More Authors

Dell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo

... Show More
View Publication
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Theoretical and Experimental Study for Corrosion Inhibition of Carbon Steel in Salty and Acidic Media by A New Derivative of Imidazolidine 4-One
...Show More Authors

A new imidazolidine 4-one derivative, of namly 2-[2-(4-Bromo-phenyl)-imidazo [1,2-a] pyridine-3-yl]-3-(4-nitro-phenyl)-imidazolidine-4-one (BPIPNP) was investigated as corrosion inhibitor for carbon steel in salty (3.5% NaCl) and acidic (0.5M HCl) solutions using potentiometric polarization measurements. The results revealed that the percentage inhibition efficiencies (%IE) in the salty solution (90.67%) are greater than that in the acidic solution (83.52%). Experimentally, the thermodynamic parameters obtained have supported a physical adsorption mechanism and which followed Langmuir adsorption isotherm. Density Functional Theory (DFT) of quantum mechanical method with B3LYP 6-311++G (2d, 2p) level was used to calculate geometrical stru

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref