Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contrast value because of the added edge points from the two combined images that depend on the suggested algorithms. This enhancement in edge regions is measured and reaches to double in enhancing the contrast. Different methods are used to be compared with the suggested method.
WA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
Theoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].
the researchers pointed that the poet relied on several means in the form of poetic images, including analogy, and the metaphor with its various elements, The chromatic component has also been used in the formation of its poetic image,and resorted to the correspondence of the senses and the symbol of two types:Self-code, public code : And we find a variety of symbolic stems from different sources, from these symbols, what is religious, including what is historical and what is legendary, and such symbols, which resorted to the rare places of his poems confined to the myths contained in the Bible, His use of the general symbols was ineffective in the poetic picture, relying on the metaphor and metaphor.
Theater is a renewed art until this moment, and it does not stray from its components from life and its spaces in general, but rather is derived from them according to characteristics and directions intended to differ based on finding other, more effective solutions, Therefore, the research entitled (Extractive treatments of the space between tradition and contrast in contemporary theater) consists of four chapters. The first chapter came under the title (the methodological framework). Where he dealt with the research problem and then the importance of the research and the goal of the research as well as the objective, temporal and spatial limits of the research, In addition to defining the terminology and then finding the procedural ter
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Background: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreThe research seeks to identify the image of foreign oil companies operating in Iraq among the public of Basra, and the research aims to clarify the mental image of foreign oil companies among the Iraqi public, and to identify the extent to which the Iraqi public benefit from the social responsibility programs offered by foreign oil companies and their contribution to improving the standard of living and services for the population. Nearby areas and society as a whole, the research is classified within descriptive research, and the researcher used the survey method for the Iraqi public in Basra governorate, which includes the areas in which these companies are located, and he used the scale tool to find out, so he distributed 600 que
... Show More