A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.
Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show MoreIn this work, enhancement to the fluorescence characteristics of laser dye solutions hosting highly-pure titanium dioxide nanoparticles as random gain media. This was achieved by coating two opposite sides of the cells containing these media with nanostructured thin films of highly-pure titanium dioxide. Two laser dyes; Rhodamine B and Coumarin 102, were used to prepare solutions in hexanol and methanol, respectively, as hosts for the nanoparticles. The nanoparticles and thin films were prepared by dc reactive magnetron sputtering technique. The enhancement was observed by the narrowing of fluorescence linewidth as well as by increasing the fluorescence intensity. These parameters were compared to those of the dye only and the dye solution
... Show MoreAbstract:
The aim of the present research is to evaluate the child’s nutritional
method (2-5 years old) which is based on his resistance of the food highly rich
with nutritional elements and his acceptance of the food of a low nutritional
value in addition to his having forbidden food with other mates and making
use of all mates when having food, in establishing the sound social values and
affection since child hood. The required statistical equation have been used
by the researcher namely (Z test).
The sample of the present study consists of (26) children who were selected
intentionally and randomly from the kindergartens of Al-Bayaa region and the
college of Education for women. The questionnaires were d
يهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة في العراق وفقاً لنظرية الذكاءات المتعددة عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر الذكاءات المتعددة في محتوى كتابي الحاسوب المقرران على طلبة المرحلة المتوسطة (الصفين الأول والثاني) للعام الدراسي (2017-2018) م؟ ولتحقيق هدف البحث اتبعت الباحثة منهج البحث الوصفي التحليلي (تحليل المحتوى)، واعتمدت الفكرة الصريحة وحده للتسجيل، أما أداة البحث فهي أداة
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreThe effect of substitution of Ni on Cu in (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x Nix O10+? for (x=0,0.1….1,2,3) superconductor system and sintering time has been investigated .The samples were prepared by solid-state reaction methods. The results show that the optimum sintering temperature is equal to 850 ºC, and the sintering time is equal to 140 h. The highest transition temperature (Tc) obtained for (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x NixO10+? composition was 113 with x=0.8 Phase analyses of the samples by X-ray diffraction (XRD) analysis showed an orthorhombic structure with a high Tc phases (2223) as a dominant phase and low Tc phase (2212) in addition to some impurity phases.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThe problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all
... Show MoreThe present study deals with the story of Epidemic in two literary works issued in the same year (1947). One of them is a novel titled "Plague" written by the French writer Alber Kamo, the second is a poem of the Iraqi poetess Nazik Al-Malaekah. The research reflects a contrastive study of the war vision in the two works as both writers used science to serve literature by using Epidemic as a metaphor to refer to the dangers that the societies faced.
The problem of the present research lies in answering the question about the reason that makes the two writers use metaphor while narrating the issues of the society instead of mentioning them directly and illuminate what implications do the narrative style of Epidemic story have and
... Show More