This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and change its characteristic are solved through calculating invariant eigen range of the recursive resolution forms of all sub-images coefficient. These approaches employed here as multi-wavelet transform identifier with minimum Mahalanobis distance. All method recognition proposed in this paper are applied on different images. Different tables of image recognition resulted in accurate and fast.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThis study deals with the orthographic processing ability of homophones
which can account for variance in word recognition and production skills due to
phonological processing. The study aims at: A)Investigating whether the students
can recognize correct usage and spelling comprehension of different homophones
by using appropriate word that overlapped in both phonology and orthography.
B)Assessing spelling production word association to the written form of the
homophone in the sentence comprehension task. To achieve these aims, two tests
have been conducted and distributed on 50 students at first stage at the College of
Education(Ibn-Rushd) for the academic year 2010-2011. The two tests are exposed
to a jury of
The research tagged (the image of the soldier in contemporary Iraqi painting) dealt with the concept of the image as one of the basic concepts in the creative achievement, whether it is in the field of art, literature or beauty. Therefore, the concept of the image expanded to express the various aspects of human creativity, including the field of painting. To know the image of the soldier in contemporary Iraqi painting, the research included four chapters. The first chapter focused on the methodological framework of the research, while the second chapter included three sections. The first topic dealt with the philosophical and artistic concept of the image. The second topic was concerned with the representations of the soldier's image in
... Show MoreThe purpose of this study is to compare the influence of three teaching methods, as represented by problem-based learning (PBL), the PBL with lecture method, and the conventional teaching on undergraduate physics students' group work skills among bachelor’s degree physics students. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The actual sample size comprises of 122 students, who were selected randomly from the physics department, college of education in iraq. Overall, the statistical results rejected null hypothesis of this study. Thus, using the PBL without or with lecture method enhances the skills of the group work among the bachelor’s degree physics studen
... Show MoreThe purpose of this study is to evaluate the effect of hydrated lime addition methods as filler replacement on fatigue performance of Hot Mix Asphalt (HMA). Three types of addition methods of hydrated lime were introduced namely dry HL on dry aggregate and saturated surface aggregate above 3% and slurry HL on dry aggregate, ordinary Lime stone powder was reduced by three HL percentage (1.0, 2.0 and 3.0 %). The effect of different methods were investigated on the fatigue properties of HMA using, third-point flexural fatigue bending Test. Pneumatic Repeated Load System (PRLS) was carried out to establish the effect of hydrated lime on the fatigue failure criteria and to select the proper hydrated lime application methods on fatigue behavior o
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More