A nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.
This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
The research aimed to study the role that the media play in shaping the public knowledge of human rights issues among the people of Kirkuk, which will be the focus of the study. The research was conducted by applying a survey panel to a random sample of the city's audience. The research dealt with the theoretical aspect of a theory that relied on the media, and the loans provided by the theory, on the basis of which the research was conducted and the research problem was determined based on a major question: What is the role that the mass media play in developing the knowledge of members of the public on human rights and the relationship between the intensity of view in that, as well as the identification of the effect of two variables G
... Show MoreCommunity detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo
... Show MoreThe tagged search (The aesthetic images in Mohammed Thanoun graphic) four chapters, Chapter I was concerned the statement of the research problem, the research importance and it’s needed, the goal of research in identifying the aesthetic images in the graphic of the artist's, the research limits, and identifying the most important terms, chapter II came with theoretical framework and included three chapters: chapter I was interested in the aesthetic concept. chapter II is the image aesthetic in the graphic, and chapter III is the artist experience, Chapter III specializes in research procedures: community, sample, curriculum, tool, and sample analysis. Chapter IV ended with results, including: dynamic research sample illustrated of the
... Show MoreABSTRACT Background: Color changes that are detectable to human eye can affect the esthetic appearance of ceramic veneers. The purpose of this study was to evaluate and compare the effect of artificial accelerated aging on the color of ceramic veneers cemented with different resin cements. Materials and Methods: Sixty discs were prepared with 0.5 mm thickness, 30 discs made from IPS e.max press (Ivoclar Vivadent) and 30 discs were made from VITA Enamic (VITA Zahnfabrik). The discs were cemented with three resin cements: Variolink Veneer MV 0 shade (Ivoclar Vivadent), Rely X veneer Translucent shade (3M ESPE) and NX3 Nexus Clear shade (Kerr Corporation) with 0.1 mm thickness. The spectrophotometer Easyshade Advance was used to measure the co
... Show MoreFind all boils down to is marked with (recruitment aesthetic of digital technology for (color) in the film novelist) And the relationship between the aesthetic employment of digital technology for (color) and its impacts on the level of artistic creativity through digital technology and its impacts on the technical and completed the final film in the film.Search and distributed at five chapters The first chapter discusses the methodological framework of the research, which included the research problem and is as follows:What is the digital technology to enrich color in the context in the film narrative to reflect the dramatic effect?And the importance of research and its objectives, including:1 - Employment aesthetic of digital technolog
... Show MoreColors are universal, and throughout the ages, they have been associated with
various religious, social and spiritual meanings. They symbolize a galaxy of things
to designate certain ideas or symbols that are sometimes contradictory.
The present study is an attempt to investigate colors, their meanings and
symbolism, and the approaches to translating color idioms from English into
Arabic. It fathoms one of the thorny areas for translation theorists let alone
practitioners. Various definitions, classifications of types and symbolism across
cultures are provided. After reviewing idioms and methods of translating them, a
survey of 114 sentences that include color idioms was conducted to see which
method is mostly
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn recent years, non-oil primary balance indicator has been given considerable financial important in rentier state. It highly depends on this indicator to afford a clear and proper picture of public finance situation in term of appropriate and sustainability in these countries, due to it excludes the effect of oil- rental from compound of financial accounts which provide sufficient information to economic policy makers of how economy is able to create potential added value and then changes by eliminating one sided shades of economy. In Iraq, since, 2004, the deficit in value of this indicator has increased, due to almost complete dependence on the revenues of the oil to finance the budget and the obvious decline of the non-oil s
... Show More