A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.
Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show MoreNatural dye sensitized solar cell was prepared using strawberry and pomegranate dyes with anatase nanocrystalline titanium dioxide powder. A study of the optical properties of the two dyes, involving the absorption spectrum was determined in the visible region. I-V characteristics under illumination were performed. The results showed that the two prepared dye sensitized solar cells have acceptable values efficiency about (0.94 with Fill factor (45)) and (0.74 with Fill factor (44)) for strawberry and pomegranate dyes, respectively.
The purpose of this paper to discriminate between the poetic poems of each poet depending on the characteristics and attribute of the Arabic letters. Four categories used for the Arabic letters, letters frequency have been included in a multidimensional contingency table and each dimension has two or more levels, then contingency coefficient calculated.
The paper sample consists of six poets from different historical ages, and each poet has five poems. The method was programmed using the MATLAB program, the efficiency of the proposed method is 53% for the whole sample, and between 90% and 95% for each poet's poems.
Oil flow lines are used to transport oil and its derivatives from a well over long distances, and because oil wells produce other potentially corrosive products, such as carbon dioxide and Hydrogen sulfide, it is necessary to take methods to protect the pipeline from corrosion. One of these methods is the use of corrosion inhibitors in this study. Prepare 5-acetyl-2-anilino-4-dimethylaminothiazole and test it as a corrosion inhibitor on a sample of the Rumaila flow line at a constant temperature 25°C in (3.5%) NaCl and (3.5%) KCl solution in the absence and presence of different concentrations of inhibitor (0 mM, 0.01 mM, 0.03 M, 0.05 mM). by using liner polarization (Tafel slope). The inhibiter exhibited the best performance at hi
... Show MoreSpraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
Background: Tooth eruption is a more general process, however, which includes certain posteruptive tooth movements. There are two fundamental requirements for both tooth eruption to occur: (1) Require soft tissue, intervening between tooth structure and alveolar bone, which plays an important role in regulating the remodeling of adjacent tissues. (2) Require bone turnover that is temporally and spatially regulated to facilitate specific translocations of teeth through alveolar bone These amniotic stem cells are multipotent and able to differentiate into various tissues, which may be useful for human application and recently it used in many medical branches. CD34 is an endothelial marker that is extensively used in immunohistochemistry a
... Show MoreA simple, accurate and sensitive spectrophotometric method for the determinaion of epinephrine is described . The method is based on the coordination of Pr (III) with epinephrine at pH 6. Absorbance of the resulting orange yellow complex is measured at 482 nm . A graph of absorbance versus concentrations shows that beer 's low is obeyed over the concentration range (1-50)mg.ml-1 of epinephrine with molar absorpitivity of ( 2.180x103 L.mol-1.cm-1 ), a sandell sensitivity of (0.084 mg.cm-2 ), a relative error of (-2.83%) , a corrolation coffecient (r= 0.9989) and recovery % ( 97.03 ± 0.75 ) depending on the concentration.This method is applied to analyse EP in several commercially available pharmaceutical preparations
... Show More