Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering. The extraction of features gave a high distinguishability and helped GA reach the solution more accurately and faster.
Eichhornia crassipes (Mart.) Solms or Water hyacinth is a fertile floating aquatic widespread in worldwide. The form of plants and the anatomy parts of this plant were studied. The most important feature was obvious the air chamber with intercellular spaces by amazing arrangement. As well can notice aerenchyma tissue allow the parts of plants floated on the surface of water located in the ground meristem of root, petiole and in the mesophyll of leaves also presence of two type of crystals raphides and styloid crystals was noted of various member in the plant in addition appear astrosclereids around the air chambers, to support the plant parts from the unsuitable environmental conditions such as the speed of water flow or floods or high leve
... Show MoreThis paper aims to early study of detection and diagnosis of kidney tumors and kidney stones using Computed Tomography Scanning CT scan images by digital image processing. Computerized Axial Tomography (CAT) is a special medical imaging technique that provides images with 3D, including much information about the body's construction consisting of bones and organs. A C.T scan uses X-rays to create cross-sectional images of the body and gives the doctor a full explanation of the diagnosis of the situation through the examination. It has been used in five cases of kidney images, including healthy, stones, tumors (cancer), cystic and renal fibrosis. The masking procedure is used to separate the required C.T. images
... Show MoreGod sent the Prophet Muhammad as a teacher and promising harbinger {that is sent to the illiterate messenger reciting to them His signs and purifies them and teaches them the Book and Wisdom} [Friday: 2]; the wisdom of Baos Prophet him peace be and am back to teach people, - Education and therefore his life was very rich educational tactics And has passed the Prophet in different circumstances and conditions that can be experienced by a teacher or educator in any time, anywhere; there is no case of going through the educator or teacher only finds the same or similar or likened to, or close to it in the life of the Prophet peace be upon him Prophet has lived God's peace be upon his strengths and weaknesses, victory and defeat, he lived or
... Show MoreSummary This research, entitled (Distinguishing Voice Features of Qalqales Voices and their Expressive Values in the Holy Quran), aims to shed light on five of the voices that are characterized by strength and intensity, whose pronunciation requires loud vocal tone, great effort and semantic dimensions.The research consists of two topics .in the first topic. We talked about the voices of Alqalqal , their definition, their degrees, their ranks, and the opinions of scholars about them.
In the second topic, titled Expressive Values for Weak Voices in the Holy Qur’an, we talked about the relationship between sound and meaning, and we clarified in it the expressive values of Qalqa
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More