User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreThe interest of application of liquid membrane (pertraction) processes for recovery of medicinal compounds from dilute ammoniacal leach solutions is demonstrated. Selectivity of the liquid membrane ensures a preferential transport of the desired solute from the native extract into the strip solution, vinblastine was successfully extracted from basic media (pH 9.2) and stripped by acidic media of sulfuric acid (pH= 1.3) applying continuous pertraction in a rotating discs contactor and using n-decane as liquid membrane. Transport of vinblastine in three-liquid-phase system was studied and performed by means of a kinetic model involving two consecutive irreversible first-order reactions. The kinetic parameters (apparent rate constants of th
... Show MoreIn this paper, the concept of normalized duality mapping has introduced in real convex modular spaces. Then, some of its properties have shown which allow dealing with results related to the concept of uniformly smooth convex real modular spaces. For multivalued mappings defined on these spaces, the convergence of a two-step type iterative sequence to a fixed point is proved
The Egyptian labor movement is the oldest trade union movement in the Arab region. Beside, the labor movement in any society is, in fact, only a reflection of the extent of awareness of that class in that society. Such a comparison is based on the degree of social growth the working class has reached. Moreover, the Egyptian working class was characterized by modernity in its inception compared to other social forces and classes. In addition, its development is linked to the level of industrial development of the country. The peasants and craftsmen were the mainstay of production in the Egyptian society over several centuries. The labor union movement also represents the human aspect of the labor force when it encounters and interacts wit
... Show MoreThe main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show MoreThe design of the Graphic has recently taken a great variety in the curricula and design methods that have led to its applications for career advancement and aesthetic quality. This is due to the communicative role that it plays in the movement of human beings and their aspirations. Among these applications are the designs of magazine covers in different variations. The design of the cover is based on a structural system that requires awareness and skill from the designer, especially since the organizational structure in the design of the envelope is limited in both vocabulary and space, and in the neighborhood Many have the image of sovereignty and sometimes the other head line, and can lead color values are other.
In all
... Show More<p><span>This research deals with the feasibility of a mobile robot to navigate and discover its location at unknown environments, and then constructing maps of these navigated environments for future usage. In this work, we proposed a modified Extended Kalman Filter- Simultaneous Localization and Mapping (EKF-SLAM) technique which was implemented for different unknown environments containing a different number of landmarks. Then, the detectable landmarks will play an important role in controlling the overall navigation process and EKF-SLAM technique’s performance. MATLAB simulation results of the EKF-SLAM technique come with better performance as compared with an odometry approach performance in terms of measuring the
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More