Design and construction of video extractor circuit require an understanding of several parameters, which include: Selector circuit, extracting circuit which contains sampling signal and multiplexing. At each radar pulse, the video signal is fed to one of the selector. The fast filter has a pass –band from 190 Hz to 1800 Hz. These frequencies correspond to targets having radial velocities laying between and 10 Kph and 200 Kph.Slow filter: 60 Hz to 230 Hz for radial velocities laying between 3.5 and 13 Kph.The video- extractor is organized in four PCB CG (A-B-C-D) each one having 16 selector. The sampling signal (ADS) (1-2-3-4) control the 4-line-to-16-line decoders. 8 multiplexers of 8 inputs each, are required for the multiplexing of the 64 selectors.
In the last years, the research of extraction the movable object from video sequence in application of computer vision become wide spread and well-known . in this paper the extraction of background model by using parallel computing is done by two steps : the first one using non-linear buffer to extraction frame from video sequence depending on the number of frame whether it is even or odd . the goal of this step is obtaining initial background when over half of training sequence contains foreground object . in the second step , The execution time of the traditional K-mean has been improved to obtain initial background through perform the k-mean by using parallel computing where the time has been minimized to 50% of the conventional time
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreThe research studies the melodic and rhythmic characteristics of monologue, in addition to how it was transferred from the Arab homeland to Iraq and reviewed its most prominent performers, as well as a review of the monologue types and their propagation in the Arab homeland such as comical, dramatic, and political and guidance monologues.
The methodological framework included: the problem of the research, the importance of the research and the objective of the research which is to uncover the melodic and rhythmic structure of the monologue in Iraq. The limits of the research included the objective limit tackling the art of monologue and the spatial limit which is Baghdad
... Show MoreDue to the increasing number of people with in Iraq, it has become necessary to treat seriously this problem, which was not considered significantly to the best of researcher knowledge. Thus, the current research aims to construct a scale to measure the physical down syndromes, which distinguish them from others. It consisted of (39) items. The researcher has presented some related literature that addressed the current problem
The main purpose of this work is to find the complete arcs in the projective 3-space over Galois field GF(2), which is denoted by PG(3,2), by two methods and then we compare between the two methods
The problem of the research came through the following question (what is the effectiveness of active design in contemporary industrial products), and it emphasized the importance of research to make society with its members in a positive state of activity, and what can help the industrial product design to achieve this, but the goal of the study is (determining the characteristics and principles of design Active and its effectiveness in the industrial product), and the study was determined by industrial products related to daily, recreational and sports activity, The researcher relied on a form to determine the axes of analysis for the sample models, in order to reach the results of the research, the most important of which are: Realiz
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show More