A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.
The research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show MoreEl estudio se clasifica dentro los estudios teóricos sobre literatura que se ocupa del estudio de los métodos de la crítica literaria: El Estructralismo literario francés y el Formalismo ruso del siglo XX que se utilizan en la interpretación literaría. Las dos corrientes literarias estudian la literatura como ciencia que busca aplicar un método científico al estudio de la literatura. Dicho estudio trata de exponer las teorías críticas que surgen en el debate de la interpretación de los textos literarios como el de Susan Sontag, Ricoeur Paul y Mijail Bajitin, etc. Además se incluye algunos ejemplos implican el análisis estructuralista y formalista como Kafka y la tragedia Judía. y Sur Racine.
ABSTRACT:
... Show MoreThe orient culture and heritage has directly influenced ,in a way or another , the literary works which recently have been noted by the oriental Jews inside and outside of Israel. Several Jewish writers, who came from the orient (especially from Iran ), have written their works while influenced by traditions and customs of the Iranian society, in which they were born , lived , and raised, and by the writers who were born in that society and then moved to Israel and lived there as a result of the Zionism and its notorious promises to gather Jewish people from all over the world to establish their national home at the expense of the Palestinian land and people.
That final
... Show MoreLas diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.
En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:
"El aprendizaje de una segunda lengua (L2) es el
... Show MoreThe administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce costs) to prove the hypothesis has sought research to achieve its goal of Alkadivh and Alkoppelan &nb
... Show MoreIn this research, the multi-period probabilistic inventory model will be applied to the stores of raw materials used in the leather industry at the General Company for Leather Industries. The raw materials are:Natural leather includes cowhide, whether imported or local, buffalo leather, lamb leather, goat skin, chamois (raw materials made from natural leather), polished leather (raw materials made from natural leather), artificial leather (skai), supplements which include: (cuffs - Clocks - hands - pockets), and threads.This model was built after testing and determining the distribution of demand during the supply period (waiting period) for each material and completely independently from the rest of the materials, as none of the above mate
... Show MoreThis paper presents the application of a framework of fast and efficient compressive sampling based on the concept of random sampling of sparse Audio signal. It provides four important features. (i) It is universal with a variety of sparse signals. (ii) The number of measurements required for exact reconstruction is nearly optimal and much less then the sampling frequency and below the Nyquist frequency. (iii) It has very low complexity and fast computation. (iv) It is developed on the provable mathematical model from which we are able to quantify trade-offs among streaming capability, computation/memory requirement and quality of reconstruction of the audio signal. Compressed sensing CS is an attractive compression scheme due to its uni
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show More