The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images instead of huge images with the same parameters. This provides users in social media with efficient tools to search their images and establish a database or a collection of special images to their interests. Experiments using face detection and background notice based indexing techniques support the idea that the proposed algorithm achieves significantly better results in terms of computing cost. This technology will support control the explosion of media-rich content by offering users an efficient automated image indexing and retrieval tool for compressed images on the Internet
Background: The aim of the present study is to evaluate the esthetic smile in sample of Iraqi adults and to assess the gender differences. Materials and Methods: 100 persons (50malesand 50 females had class I normal dental and skeletal selected for this study.Clinical examination and digital photograph with posed smile were performed for each individual. Six linear soft tissue parameters in each photograph using AutoCAD program 2011. Five visual and four quantitative evaluations of the smile were studied for eachsubject. The smile arch and index, buccal corridor spaces (BCSs) were studied.Descriptive statistics of the measurements were calculated. Independent student’s ttestswere used to evaluate the gender differences. Statistics: Desc
... Show MoreBackground: Tubal ligation, recognized as a surgical intervention that ensures permanent contraception, has established itself as an option for women seeking a definitive solution for family planning. Objective: To assess the psychosexual implications of tubal ligation in a sample of women in Baghdad, Iraq. Methods: A prospective cohort study was conducted in a teaching hospital for 2 years, from the first of January 2022 to the end of December 2023, in which 203 women who underwent tubal ligation were included. Results: In the present study, we found that 158 (77.8%) had no depression, mild depression presented in 27 (13.3%), and moderate depression in only 15 (7.4%). While 163 (80.3%) of women did not suffer from anxiety, 32 (15.8
... Show MoreFifty one patients with serologically confirmed brucellosis and 70 healthy controls were phenotyped for HLA-A, -B, -DR and -DQ antigens by using standard microlympho-cytotoxicity method, and lymphocytes defined by their CD markers (CD3, CD4, CD8 and CD19). The results revealed a significant (Pc = 0.001) increased frequency of HLA-DR8 (41.18 vs. 10.0%) in the patients . A significant increased percentage of CD8+ lymphocytes was also increased in the patients (25.15 vs. 22.0%; P = 0.006), while CD3+ lymphocytes were significantly decreased (75.1 vs. 79.4%; P = 0.02).
Background: Recurrent aphthous stomatitis (RAS) is one of the most common oral mucosa diseases characterized by recurrent, shallow, round or oval painful oral ulcers surrounded by inflammatory erythematous halos, the condition is chronic and self-limiting in immunocompetent patients. Aim of the study: to investigate the serum vitamin D levels in Iraqi female patients with RAS and the relationship between vitamin D levels and the severity of RAS. In this cross sectional study 30 female patients with idiopathic RAS, and 30 age and sex matched healthy controls were included, the severity of RAS is assessed by the number of oral aphthous ulcers in each attack and the frequency of attacks. Serum 25(OH) D levels were determined by the Enzy
... Show MoreThe effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.
FG Mohammed, HM Al-Dabbas, Iraqi journal of science, 2018 - Cited by 6
The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe inhibitive action of Reactive Red (RR31) dye against corrosion of carbon steel in 1M acetic acid solution has been studied using gravimetric method at temperature ranged (288-318)K. The antibacterial activity for the different concentrations of RR31 dye against different bacterial species was studied. The experimental data indicates that this dye acts as a potential inhibitor for carbon-steel in acetic acid medium and the protection efficiency increase with increasing (RR31) dye. The adsorption of (RR31) dye on the carbon steel surface was found to follow Langmuir adsorption isotherm. Thermodynamic data for the adsorption process such as Gibbs free energy change ∆Gads, enthalpy change ∆Hads, and entropy change ∆Sads were estima
... Show MoreTool wear is a major problem in machining operations because the resulting material loss gradually changes of the machine tool. There many factors may leads to material loss like; friction, corrosion, and also it’s happened by rubbing during machining processes between the work piece and the tool. Dimensional accuracy of the work piece, and also the surface finish will be reducing by tool wear. It can also increase cutting force. In this study, we focused on the effect of the coating process on crater wear problems. Crater wear is caused by the flow between the chip and the rake face of the tool, whereas flank wear is caused by the contact between the tool and the work piece. In reducing crater wear, aluminum titanium nitride (AlTiN) u
... Show More