Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processed. After detecting the faces, the Color-Space algorithm is used to tracks the detected faces depending on the color of the face and to check the differences between the faces the Template Matching algorithm was used to reduce the processes time. Finally, the
detected faces as well as the faces that were tracked based on their color were obscured by the use of the Gaussian filter. The achieved accuracy for a single face and dynamic background are about 82.8% and 76.3% respectively.
The k-out-of-n:G (or k/n:G) system structure is a very popular of redundancy in
fault-tolerant systems, with wide applications in so many fields. This paper presents
two states of multi-state k/n:G systems. The first part, we present the definition that
introduced by Al-Neweihi et al [1], where the values are the same with respect
to all system states and we show that there exists an alternative equivalent definition
to Al-Neweihi's definition. In the second part of this paper we give more general
definition proposed by Huang et al [2], where it allows different values with
respect to different system states and we provide there exists an equivalent definition
to Huang's definition when the values are increasing.
The aim of the present study is to evaluate the change in the levels of glucagon, GLP-1 and GPCR in diabetic patient's and diabetic with dyslipidemia as metabolic syndrome. The study included 75 male aged ranged (30-50) years and with BMI (25-29) kg/m2 which divided into three groups as follows: group one (G1): consist of 25 subjects as healthy control group. Group two (G2): consist of 25 patient's with diabetes mellitus and group three (G3): consist of 25 patient's with diabetic and dyslipidemia as metabolic syndrome. Serum was used in determination of FBG, lipid profile, insulin, glucagon, GLP-1 and GPCR. Whole blood was determination of HbA1c. The results revealed significant elevation in FBG and HbA1c in G2 and G3 comparing to G1. While
... Show MoreBackground: Chronic hyperglycemia causes diabetic nephropathy(DN), which is a typical microvascular complication of type 2 diabetes mellitus. The pathogenesis of DN is not fully understanding. The inflammation may possess a significant role in the progression of DN in diabetic patients. Method: The study accomplished at teaching laboratories of medical city, Baghdad, Iraq. It was included 50uncontrolled diabetic type 2 patients with nephropathy, age range (40-78) years and 42 controlled diabetics type 2 without nephropathy, age range (35 - 52) years as a control group. The participants divided in to two groups according to HbA1c measurement which is described as follows: < 7.5% of HbA1c describes controlled diabetes, and > 9% of HbA1c
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
In this paper a method to determine whether an image is forged (spliced) or not is presented. The proposed method is based on a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe
... Show MoreThe primary objective of this paper is to introduce a new concept of fibrewise topological spaces on D is named fibrewise multi- topological spaces on D. Also, we entroduce the concepts of multi-proper, fibrewise multi-compact, fibrewise locally multi-compact spaces, Moreover, we study relationships between fibrewise multi-compact (resp., locally multi-compac) space and some fibrewise multi-separation axioms.
This study proposed using color components as artificial intelligence (AI) input to predict milk moisture and fat contents. In this sense, an adaptive neuro‐fuzzy inference system (ANFIS) was applied to milk processed by moderate electrical field‐based non‐thermal (NP) and conventional pasteurization (CP). The differences between predicted and experimental data were not significant (
The primary purpose of this paper is to introduce the, N-coprobabilistic normed space, coprobabilistic dual space of N-coprobabilistic normed space and give some facts that are related of them.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.