Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processed. After detecting the faces, the Color-Space algorithm is used to tracks the detected faces depending on the color of the face and to check the differences between the faces the Template Matching algorithm was used to reduce the processes time. Finally, the
detected faces as well as the faces that were tracked based on their color were obscured by the use of the Gaussian filter. The achieved accuracy for a single face and dynamic background are about 82.8% and 76.3% respectively.
In this work we present the concepts of topological Γ-ring, norm of topological Γ-ring, homomorphism, kernel of topological Γ-ring and compact topological Γ-ring
In this paper, we define the concept of soft -connected sets and soft -connected spaces by using the notion of soft -open sets in soft topological spaces. Several properties of these concepts are investigated.
Let be a commutative ring with identity , and be a unitary (left) R-module. A proper submodule of is said to be quasi- small prime submodule , if whenever with and , then either or . In this paper ,we give a comprehensive study of quasi- small prime submodules.
the regional and spatial dimension of development planning must be taken as a point of departure to the mutual of the spatial structure of the economy , development strategy and policies applied 'therein such as the location principles and regional development coordination of the territorial problems with the national development planning and timing of regional vis-a-vis national development plan_. Certain balance and integration is of sound necessity' between national _regional and local development objectives through which the national development strategy should have to represent the guidelines of the local development aspirations and goals. The economic development exerts an impact on the spatial evolution, being itself subje
... Show MoreIn this notion we consider a generalization of the notion of a projective modules , defined using y-closed submodules . We show that for a module M = M1M2 . If M2 is M1 – y-closed projective , then for every y-closed submodule N of M with M = M1 + N , there exists a submodule M`of N such that M = M1M`.
In this work we shall introduce the concept of weakly quasi-prime modules and give some properties of this type of modules.
The purpose of this paper is to prove the following result : Let R be a 2-torsion free prime *-ring , U a square closed *-Lie ideal, and let T: RR be an additive mapping. Suppose that 3T(xyx) = T(x) y*x* + x*T(y)x* + x*y*T(x) and x*T(xy+yx)x* = x*T(y)x*2 + x*2T(y)x* holds for all pairs x, y U , and T(u) U, for all uU, then T is a reverse *-centralizer.
The Syriac language is one of the ancient Semitic languages that appeared in the first century AD. It is currently used in a number of cities in Iraq, Turkey, and others. In this research paper, we tried to apply the work of Ali and Mahmood 2020 on the letters and words in the Syriac language to find a new encoding for them and increase the possibility of reading the message by other people.
<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t
... Show More