Preferred Language
Articles
/
HxYII4cBVTCNdQwCGjpB
A POWERFUL AUTOMATED IMAGE INDEXING AND RETRIEVAL TOOL FOR SOCIAL MEDIA Sample
...Show More Authors

The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images instead of huge images with the same parameters. This provides users in social media with efficient tools to search their images and establish a database or a collection of special images to their interests. Experiments using face detection and background notice based indexing techniques support the idea that the proposed algorithm achieves significantly better results in terms of computing cost. This technology will support control the explosion of media-rich content by offering users an efficient automated image indexing and retrieval tool for compressed images on the Internet

Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Digital Color Image Watermarking Using Encoded Frequent Mark
...Show More Authors

With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.

This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 09 2022
Journal Name
Research Anthology On Improving Medical Imaging Techniques For Analysis And Intervention
Groupwise Non-Rigid Image Alignment Using Few Parameters
...Show More Authors

Groupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is eff

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Proceedings Of International Conference On Data Science And Applications
Very Low Illumination Image Enhancement via Lightness Mapping
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-nahrain Journal Of Science
Image Classification Using Bag of Visual Words (BoVW)
...Show More Authors

In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.

View Publication Preview PDF
Crossref (24)
Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The Contribution of Behavioral Disorders to Predicting Bullying Patterns in a Sample of Adolescents with Autism Spectrum Disorder: College of Education and Arts - Northern Border University - Kingdom of Saudi Arabia.
...Show More Authors

The present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 24 2021
Journal Name
International Journal Of Differential Equations
The Impact of Media Coverage and Curfew on the Outbreak of Coronavirus Disease 2019 Model: Stability and Bifurcation
...Show More Authors

In this study, the spreading of the pandemic coronavirus disease (COVID-19) is formulated mathematically. The objective of this study is to stop or slow the spread of COVID-19. In fact, to stop the spread of COVID-19, the vaccine of the disease is needed. However, in the absence of the vaccine, people must have to obey curfew and social distancing and follow the media alert coverage rule. In order to maintain these alternative factors, we must obey the modeling rule. Therefore, the impact of curfew, media alert coverage, and social distance between the individuals on the outbreak of disease is considered. Five ordinary differential equations of the first-order are used to represent the model. The solution properties of the system ar

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Social Loafing and its Relation to the Personality Traits of Kindergarten Teachers: ابتسام سعيد احمد
...Show More Authors

The research seeks to know the social loafing of kindergarten teachers and their relation to personality traits. In order to achieve the research objectives, the researcher constructed the social loafing scale, which she applied to kindergarten teachers. The scale consists of (22) paragraphs. It has good credibility and stability. The coefficient of stability (85.0) was the retest method and (81.0) Alpha Cronbach equation. In addition, the researcher has adopted (Raymond Cattel) personality traits scale, which has been adapted to the Arab environment (Abdel Rahman and Abu Abada,1998), The scale consists of (39) paragraphs, and enjoys the apparent honesty. The measure of social loafing and the measure of personality traits was applied to

... Show More
View Publication Preview PDF
Publication Date
Mon May 02 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities An International Open-access Peer Reviewed Referred Journal
Identity Construction and Social Structures in Sia Figiel’s Novel Where We Once Belonged
...Show More Authors

This article focuses on identity construction and social structures within the Sāmoan community as represented in Sia Figiel’s novel Where We Once Belonged. I argue that however the post/colonial Sāmoan identity is hybridized, the essence of the individual is still connected to Fa’a Sāmoa-the Sāmoan traditions and ways. However rapid are the colonial vicissitudes, the Sāmoan literature and lifestyle are developed to be a resistance platform. This resistance platform is dedicated not only to expose the colonial impact but also to assist the social and political reconstruction of post/colonial Samoa. To this end, this article studies identity construction, and the challenges that women face within Sāmoan social structures.

View Publication Preview PDF