The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art background subtraction models.
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreBackground: Coated aesthetic archwires are currently the existing solutions for the esthetic problem, but the color of these archwires tends to change overtime. This study was aimed to evaluate the color stability of different types of esthetic archwires from four different companies at different time periods after immersion of two different staining drinks which are tea and Pepsi cola. Materials and methods: 48 specimens were prepared, each specimen contains 10 aesthetic archwires; and were divided according to type of solution into two groups: A (tea) &B (Pepsi cola); each group contained 24 specimens (12 specimens were immersed in the staining solution as 4 specimens for each time intervals and 12 specimens were immersed in distilled wa
... Show MoreHepatocellular carcinoma (HCC) is the third most common cause of cancer-related death. Therefore, it is critical for researchers to understand molecular biology in greater depth. In several diseases including cancer, abnormal miRNA expression has been linked to apoptosis, proliferation, differentiation, and metastasis. Many miRNAs have been studied in relation to cancer, including miR-122, miR-223, and others. Hepatitis B and C viruses are the most important global risk factors for HCC. This study is intended to test whether serum miRNAs serve as a potential biomarker for both HCC and viral infections HBV and C. The expression of miRNA in 64 serum samples was analyzed by RT-qPCR. Compared to healthy volunteers, HCC patients' sera expre
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreColors are universal, and throughout the ages, they have been associated with
various religious, social and spiritual meanings. They symbolize a galaxy of things
to designate certain ideas or symbols that are sometimes contradictory.
The present study is an attempt to investigate colors, their meanings and
symbolism, and the approaches to translating color idioms from English into
Arabic. It fathoms one of the thorny areas for translation theorists let alone
practitioners. Various definitions, classifications of types and symbolism across
cultures are provided. After reviewing idioms and methods of translating them, a
survey of 114 sentences that include color idioms was conducted to see which
method is mostly 
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreAmong the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the
... Show More