Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IHS), Principal Component Analysis (PCA), pyramid-based techniques, and transforming. Different quality metrics for quantitative analysis of these approaches have been debated.
Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co
... Show MoreThe occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreUndoubtedly, rutting in asphalt concrete pavement is considered a major dilemma in terms of pavement performance and safety faced by road users as well as the road authorities. Rutting is a bowl-shaped depression in the wheel paths that develop gradually with the increasing number of load applications. Heavy axle loadings besides the high pavement summer temperature enhance the problem of rutting. According to the AASHTO design equation for flexible pavements, a 1.1 in rut depth will reduce the present serviceability index of relatively new pavement, having no other distress, from 4.2 to 2.5. With this amount of drop in serviceability, the entire life of the pavement in effect has been lost. Therefore, it is crucial to look at the mechani
... Show MoreAbstract
This paper is an experimental work to determinate the effect of welding velocity and formed arc energy for CO2-MAG fusion weld pool. The input parameters (arc voltage, wire feed speed and gas flow rate) were investigated to find their effects on the weld joint efficiency. Design of experiment with response surface methodology technique was used to build empirical mathematical models for welding velocity and arc energy in term of the input welding parameters. The predicted quadratic models were statistically checked for adequacy purpose by ANOVA analysis. Additionally, numerical optimization was conducted to obtain the optimum values for welding velocity and arc energy. A good agree
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
The general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as sol
The study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.
The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:
Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of
... Show More