In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN), Convolutional Neural Network-Slanlet Transform (CNN-SLT) model uses Slanlet Transform (SLT). The CBIR system was therefore inspected and the outcomes benchmarked. The results clearly illustrate that generally, the recommended technique outdid the rest with accuracy of 89 percent out of the three datasets that were applied in our experiments. This remarkable performance clearly illustrated that the CNN-SLT method worked well for all three datasets, where the previous phase (CNN) and the successive phase (CNN-SLT) harmoniously worked together.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreFuture generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreThis research sheds light on the development that has occurred on the use of press pictures in the Iraqi press by analyzing the form and content of the images used in (Al-Sabaah) newspaper for the 2012 model. The researcher's interest in this topic for what represented by the press picture of a way to highlight and attract the reader's attention to the substance journalist who represents the goals behind the newspaper publishing.
This research is divided into three sections. The first one dealt with the methodological framework of the research, and the second part addressed the aspect of press pictures and its history and technological development, while the third section devoted to the study of the development of the form and co
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show MoreThe topic of the research dealt with the image of Iraq in the British press based on a sample of the newspapers (The Guardian and the Daily Telegraph), which are among the most important and largest newspapers in the United Kingdom and the world, because of its active role in guiding local and international public opinion towards important issues and events, Since these two newspapers are interested in the accuracy of sensitive political topics, the message aimed at knowing the media image that these two newspapers painted about Iraq in the period that was limited to the first quarter of 2019, and also to know the nature of the contents promoted by these newspapers about the Iraqi reality, The method of content analysis was used as an ap
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show More