The current challenge facing our age is the information digitization, at the same time, there is a huge development in the interdisciplinary of technologies with sciences. In the last few years, the World witnessed a number of information challenges with different dimensions, including digital dimensions, which are called the digital world and the virtual world for authors and movie writers. Consequently, the digital art concept emerged that utilizes the computer in an efficient way and as a new technique for drawing. This art is considered a great leap for modern art. The influence of digital technology transformed traditional arts like painting and sculpture into new forms, from pure arts to virtual reality. The most important characteristics and advantages are reflected in saving time, effort, cost and area. Digitally, art would enrich Iraqi culture by employing Iraqi creativity. This paper targets the concept of digital art, characteristics of art in virtual society and presenting the history – origins and evolution – of digital art. A group of paintings have been created using Photoshop Cc, Photo Shop C5 and Art Rage programs.
Assessment the actual accuracy of laboratory devices prior to first use is very important to know the capabilities of such devices and employ them in multiple domains. As the manual of the device provides information and values in laboratory conditions for the accuracy of these devices, thus the actual evaluation process is necessary.
In this paper, the accuracy of laser scanner (stonex X-300) cameras were evaluated, so that those cameras attached to the device and lead supporting role in it. This is particularly because the device manual did not contain sufficient information about those cameras.
To know the accuracy when using these cameras in close range photogrammetry, laser scanning (stonex X-300) de
... Show MoreThe cadastral map is very important because it has technical and materialist
specification of the property borders and these maps which are land registration
based on it in Iraq, the problem is an ancient maps and unfit for use, despite its
importance, Therefor the updating and digitize the cadastral map is very pivotal, this
is what we have done in the present work.
In the present work, we have an old cadastral map (as a paper) was made in 1932
with modern satellite image (Quick Bird ) 2006, which has 61 cm resolution for the
same area after. Geometric correction technique has been applied by using image-toimage
method or (image registration ) and after that we get new agricultural cadaster
map and connect the
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreAs they are the smallest functional parts of the muscle, motor units (MUs) are considered as the basic building blocks of the neuromuscular system. Monitoring MU recruitment, de-recruitment, and firing rate (by either invasive or surface techniques) leads to the understanding of motor control strategies and of their pathological alterations. EMG signal decomposition is the process of identification and classification of individual motor unit action potentials (MUAPs) in the interference pattern detected with either intramuscular or surface electrodes. Signal processing techniques were used in EMG signal decomposition to understand fundamental and physiological issues. Many techniques have been developed to decompose intramuscularly detec
... Show MoreHemorrhagic insult is a major source of morbidity and mortality in both adults and newborn babies in the developed countries. The mechanisms underlying the non-traumatic rupture of cerebral vessels are not fully clear, but there is strong evidence that stress, which is associated with an increase in arterial blood pressure, plays a crucial role in the development of acute intracranial hemorrhage (ICH), and alterations in cerebral blood flow (CBF) may contribute to the pathogenesis of ICH. The problem is that there are no effective diagnostic methods that allow for a prognosis of risk to be made for the development of ICH. Therefore, quantitative assessment of CBF may significantly advance the underst
In-Band Full-Duplex (IBFD) systems have the capability of simultaneously transmitting and receiving signals through the channel and require the same resources as half-duplex systems. Unfortunately, IBFD systems have self-interference (SI) issues that prevent the system from gaining double throughput with respect to half-duplex systems. Therefore, the IBFD system will be more reliable if SI is mitigated more. This contribution will look at SI cancellation in wireless radio and underwater acoustic systems. The reviewed documents cover all types of SI cancellations, including passive, analog, and digital cancellations. In a practical full-duplex system, the SI cancellation for all domains must cancel the SI below the receiver noi
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreIn our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.