User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
The study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
Ultrasonic extraction is an inexpensive, simple and efficient alternative to conventional extraction techniques, as compared with other novel extraction techniques such as microwave-assisted extraction & supercritical fluid extraction techniques, the ultrasound apparatus is cheaper and its operation is easier. Ultrasound assisted extraction has risen rapidly in the latest decade, and for most applications it has proven to be effective compared to traditional extraction techniques. In this paper, a method of ultrasonic-assisted extraction was used to extract Inulin from tubers of Jerusalem artichoke, which have been reported to have several medicinal properties and uses. Inulin is a storage carbohydrate found in many plants especially
... Show MoreThis study examines the analysis of the contents of the international public relations campaign in confronting the Covid-19 virus, which was taken from the (Your Health is a Trust) campaign for the World Health Organization, Iraq office.The research problem revolves around a main question that is, what are the axes of the campaign (Your Health is a Trust) established by the World Health Organization (Iraq office) in the prevention of Covid 19 virus?From this main question, several sub-questions emerged that this study answered on their Facebook page, and the communication activities of the Covid-19 awareness campaign. In the content analysis form, as this form included a number of main themes and main categoriesthat were adopted in analyzin
... Show MoreIn this work, two different structures are proposed which is fuzzy real normed space (FRNS) and fuzzy real Pre-Hilbert space (FRPHS). The basic concept of fuzzy norm on a real linear space is first presented to construct space, which is a FRNS with some modification of the definition introduced by G. Rano and T. Bag. The structure of fuzzy real Pre-Hilbert space (FRPHS) is then presented which is based on the structure of FRNS. Then, some of the properties and related concepts for the suggested space FRN such as -neighborhood, closure of the set named , the necessary condition for separable, fuzzy linear manifold (FLM) are discussed. The definition for a fuzzy seminorm on is also introduced with the prove that a fuzzy seminorm on
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT), (median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Lap
In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show More