A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.
Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThe synchronization of a complex network with optoelectronic feedback has been introduced theoretically, with use of 2×2 oscillators network; each oscillator considered is an optocoupler (LED coupled with photo-detector). Fixing the bias current (δ) and increasing the feedback strength (Ԑ) of each oscillator, the dynamical sequence like chaotic and periodic mixed mode oscillations has been observed. Synchronization of unidirectionally coupled of light emitting diodes network has been featured when coupling strength equal to 1.7×10-4. The transition between non-synchronization and synchronization states by means of the spatio-temporal distribution has been investigated.
This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show MoreBackground: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega
... Show More* مشكلة البحث والحاجة اليه:
تأتي أهمية هذا العلم وقوته ومدى الحاجة اليه لكل الناس وخاصة اللذين يريدون أن يغيروا عاداتهم السيئة ويأثروا في غيرهم ، أذ اكد المفكرون والقادة والمصلحون ورجال التربية أنه يجب على الإنسان ان يكون مثابراً ومجتهداً ومتقناً لعمله ، ومنظماً لوقته الى اخر القائمة الطويلة من مفردات الجودة ولم يقولوا كيف يمكن للانسان ان يفعل ذلك ؟ أن علم الهندسة النفسية استطاع ان يجيب. 
... Show MoreThe analytical study of optical bistability is concerned in a fully
optimized laser Fabry-Perot system. The related phenomena of
switching dynamics and optimization procedure are also included.
From the steady state of optical bistability equation can plot the
incident intensity versus the round trip phase shift (φ) for different
values of dark mistuning
12
,
6
,
3
,
1.5
0 , o
or finesse (F= 1, 5, 20,
100). In order to obtain different optical bistable loops. The inputoutput
characteristic for a nonlinear Fabry-Perot etalon of a different
values of finesse (F) and using different initial detuning (φ0) are used
in this rese
Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
Permeability determination in Carbonate reservoir is a complex problem, due to their capability to be tight and heterogeneous, also core samples are usually only available for few wells therefore predicting permeability with low cost and reliable accuracy is an important issue, for this reason permeability predictive models become very desirable.
This paper will try to develop the permeability predictive model for one of Iraqi carbonate reservoir from core and well log data using the principle of Hydraulic Flow Units (HFUs). HFU is a function of Flow Zone Indicator (FZI) which is a good parameter to determine (HFUs).
Histogram analysis, probability analysis and Log-Log plot of Reservoir Qua
... Show More