An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T- test to measure the independence between more than images, (coefficient of correlate, T- test, Level of significance, find the decision), and, through experimental test, it was found that this proposed method of retrieval technique is powerful than the classical retrieval System.
Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o
... Show MoreThe Main think that be kept by the speech communication as a concept traditionally being expressed on the subject or a certain idea of a goal came on as needed functional addressed to recipients of benefits or likely to benefit from those rhetorical message through a speech importance and priority of the effect of not less than the effect of that letter, in science content role ends once you absorb it mentally, either in the art of design Valamadmon intellectual embodied through its interaction with the overall shape of the finished design, and often content is associated in the mind of the receiver through a letter communicative linked to the sense or the goal that meant the designer, and try to identify and explain. And meaning i
... Show Moreيهدف البحث الحالي إلى تحليل محتوى كتاب الحاسوب للصف الثاني متوسط وفق مهارات التفكير المنطقي للعام الدراسي(2015- 2016)م, ولتحقيق ذلك تم استخدام المنهج الوصفي التحليلي (تحليل محتوى) لملاءمته لطبيعة هدف البحث, وتم اعداد أداة البحث بالأعتماد على قائمة مهارات التفكير المنطقي بعد مراجعة الأدبيات والدراسات السابقة, وتم عرضها على مجموعة من المحكمين المتخصصين في المناهج وطرائق التدريس وعلم النفس وعلم الحاسبات والقياس
... Show Moreهدفت الدراسة الى تحليل محتوى كتاب الرياضيات للصف الاول متوسط على وفق مكونات المعرفة الرياضية (المفاهيم الرياضية , التعميمات الرياضية, المهارات الرياضية والمسائل الرياضية )
وتفرعت منه الاسئلة الاتية :
مانسبة المفاهيم الرياضية المتضمنة في كل فصل من فصول كتاب الرياضيات للصف الاول متوسط وللكتاب ككل ؟
مانسبة المهارات الرياضية المتضمنة في كل فص
... Show MoreConcealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant b
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe study of images in the cognitive field receives considerable attention by researchers, whether in the field of media and public relations or in other humanities. Due to the great importance in shaping trends of public opinion, especially trends that individuals and the behaviors of people, institutions or ideas are determined by forming images that they hold in their minds towards these persons or institutions. Modern enterprises have realized, whether they are governmental ministries and official departments or non-governmental organizations as civil society organizations, the importance of studying the dominant image in the minds of the masses and make decisions and draw plans to configure this image as these institutions wishes.&n
... Show More