The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images instead of huge images with the same parameters. This provides users in social media with efficient tools to search their images and establish a database or a collection of special images to their interests. Experiments using face detection and background notice based indexing techniques support the idea that the proposed algorithm achieves significantly better results in terms of computing cost. This technology will support control the explosion of media-rich content by offering users an efficient automated image indexing and retrieval tool for compressed images on the Internet
Hepatocellular carcinoma (HCC) is the third most common cause of cancer-related death. Therefore, it is critical for researchers to understand molecular biology in greater depth. In several diseases including cancer, abnormal miRNA expression has been linked to apoptosis, proliferation, differentiation, and metastasis. Many miRNAs have been studied in relation to cancer, including miR-122, miR-223, and others. Hepatitis B and C viruses are the most important global risk factors for HCC. This study is intended to test whether serum miRNAs serve as a potential biomarker for both HCC and viral infections HBV and C. The expression of miRNA in 64 serum samples was analyzed by RT-qPCR. Compared to healthy volunteers, HCC patients' sera expre
... Show MoreObjective(s): Evaluation of late adulthood knowledge about social frailty, measure the level of knowledge about social frailty, and to find out the relationship between knowledge and socio-demographic characteristics.
Methodology: A descriptive study design was carried out to measure the late adults' level of knowledge at Technical Institute-Suwaira in Middle Technical University and to find out the association between late adults' knowledge and their socio-demographic characteristic. The study was started from 28th April 2022 to 15th August 2022. The sample was Non-probability (convenience) sample of (100) late adults were selected according to the study that are working i
... Show MoreThe Social life contain an important side from the inherited Civilization to any
nation, is distinguished by activity and zeal. The old Indian is characterized with
closed and solidify socilal systems. This state had its influences on the activities of the
social movment. It astonished the conquered mushins – Arab to the India from the end
of the first centuny A.H we tried to change it by good works and made them become
aware, so this made radical active in the social India in Islamic period which is form
humanbeing nobilitie and their active deal in the society.
Marriage as a social case began Almighty God created Adam, peace be upon him then created from the rib Eve to be the first couple of human beings on the face of the earth and the formation of the first social family in the land, human and picked up this social reality through the generations, but in different shapes and purposes, but the mating process is one. So I got the divine religions and organized that life, especially in Islam, as explained every aspect of the life of the role and practice of marriage and had a large share in this organization and I got many Quranic verses and the Hadith.
With different civilizations, many of the marriage ceremony appeared in ancient societies take several forms of marriage.
But marriage and
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe influence of culture on accounting systems and practices, including financial reports and accounting information through the values identified by Gray and derived from social-cultural values, and the four accounting values were derived from generally accepted accounting principles represented by (Conservatism, Uniformity, Secrecy, and Professionalism). Important and significant in maximizing financial performance, and measuring the extent of the role of these values in improving financial performance through attention to the values of accounting culture, this research
... Show MoreThis study aimed to identify the role of servant leadership in promoting organizational citizenship behaviors in a sample of faculties of the University of Alqadisiya .It tried to answer several questions represented its problem.
The most important questions are the followings:
1- Is there enough perception among administrative leaders in the aforementioned faculties toward the concept of servant leadership? And under what level? &
... Show MoreThis research (The families of martyrs, victims of terrorism, war operations and military mistakes opinion about Al- Shuhada`a Establishment ) came to know and diagnose the mental image the martyrs victims of terrorism carries about the performance of Al- Shuhada`a Establishment and the services it provides to them, and to monitor the contents of that image that they had regarding their privileges and rights that Al- Shuhada`a Establishment supposed to give it to them, according to their law. The research problem was represented by the main question: (What is the image of Al- Shuhada`a Establishment among the families of martyrs, victims of terrorism, war operations and military mistakes), and this research was classified within the d
... Show MoreMany purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show More