In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
The health of Roadway pavement surface is considered as one of the major issues for safe driving. Pavement surface condition is usually referred to micro and macro textures which enhances the friction between the pavement surface and vehicular tires, while it provides a proper drainage for heavy rainfall water. Measurement of the surface texture is not yet standardized, and many different techniques are implemented by various road agencies around the world based on the availability of equipment’s, skilled technicians’ and funds. An attempt has been made in this investigation to model the surface macro texture measured from sand patch method (SPM), and the surface micro texture measured from out flow time (OFT) and British pendul
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Found through the study of tissues Alnbarh and domestic focus where a direct impact on the development of the larvae mature into pupae and then to adults appeared to clay soils have a negative impact more than sandy soil at different concentrations salt where as it turns out that the percentage of evolution fly larvae worm Lhalzonnih of the ancient worldadult to have reached more than 80%
In the present work, pattern recognition is carried out by the contrast and relative variance of clouds. The K-mean clustering process is then applied to classify the cloud type; also, texture analysis being adopted to extract the textural features and using them in cloud classification process. The test image used in the classification process is the Meteosat-7 image for the D3 region.The K-mean method is adopted as an unsupervised classification. This method depends on the initial chosen seeds of cluster. Since, the initial seeds are chosen randomly, the user supply a set of means, or cluster centers in the n-dimensional space.The K-mean cluster has been applied on two bands (IR2 band) and (water vapour band).The textural analysis is used
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Primary hypogonadism combined with Müllerian hypoplasia and partial alopecia are common features of this syndrome, which was reported only in four earlier families from areas where consanguineous marriage is prevalent. An autosomal recessive pattern of inheritance was suggested earlier and is supported by this report.
Iraq, home of the Tigris and Euphrates rivers, has survived an extreme deficiency of surface water assets over the years. The gap is due to the decline of the Iraqi water share every year, as well as a high demand for water use from different sectors, particularly agriculture.
Dam development has long given significant economic benefits to Iraq in circulating low‐priced electricity and supporting low‐income farmers by supplying them with a free irrigation system (Zakaria et al, 2012). This encouraged domestic consumption and investment.
Despite the fact that numerous advantages are expected from dam construction, it should be painstakingly assessed, utilizing cost