Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processed. After detecting the faces, the Color-Space algorithm is used to tracks the detected faces depending on the color of the face and to check the differences between the faces the Template Matching algorithm was used to reduce the processes time. Finally, the
detected faces as well as the faces that were tracked based on their color were obscured by the use of the Gaussian filter. The achieved accuracy for a single face and dynamic background are about 82.8% and 76.3% respectively.
Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.
Influenza is a highly infectious and lethal viral disease, it appears on Earth periodically in connection with the passage of comet in the vicinity of Earth around the Sun .it is believed that particles spread from the tail of the comet due to solar heating energy ,are contaminated with very tiny small particles considered as viruses. Viruses reach the Earth with the power of the solar wind due to solar activity cycle which is driven every 11 year. Viruses pushed towards Earth’s atmosphere, then precipitate on clouds and reach the surface of Earth. These viruses are very well shielded and unaffected by even UV radiation ,but the only way the shell is melt when they passes through the digestive system . Results showed a good correlation
... Show MoreTime represented a significant element in building any film story, despite its inability to express itself, but by employing the rest of the elements of the cinematic mediator language to express it. Time factor is present and manifested in all the details of the picture, and the more important is its presence in the event narration process. The narration totally depends on temporal structure in which it appears, which makes time a dominating element in the development of the narrative shapes and patterns. The narrative propositions have come to take new workings that time streams appeared that manipulate the time structure, reversing it, stopping it or making it fluctuate between the three levels of time, or repeating it or make
... Show MoreAs Alkaloids known for their pharmaceutical importance; this research included the extraction of crude alkaloids of three plants (Zingiber officinale Roscoe., Thymus vulgaris L. and Acacia arabica L.) and evaluate their activity as coagulant agent by using three degraded concentrations of each plant extract and tested them on lab mice through the observation of the variations in bleeding time (BT), clotting time (CT) and platelet count. The results revealed differences in the percentage of alkaloids in the plants under the study; Z. officinale extract was the higher one followed by T. vulgaris and A. arabica respectively. Z. officinale extract was also the most effective plant as coagulant factor than other two plants as it decreased bot
... Show MoreThis study includes the preparation of the ferrite nano ferrite CuxAl0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) M using the auto combustion method (sol-gel), and citric acid was used as fuel for auto combustion. The ferrite samples were checked by X-ray diffraction (XRD), Field Emission Scanning Electron Microscopes (FE-SEM), and energy dispersive X-ray analyzer (EDX). They showed that the prepared compound has a face-centered cubic structure (FCC). The lattice constant increases with an increase in the percentage of doping of the copper ions, and a decrease for the aluminum ion and that the compound is porous and its grains are spherical, and there are no other
... Show MoreThe structure and composition of the stellar population in the surface brightness galaxy Ic 467 is studied using BVR CCD photometry. The observations were obtained on the 1.88m optical telescope of Kottamia Astronomical Observatory, KAO, Egypt. A two-dimensional decomposition of the galaxy bulge and disk components is carried out. A powerful star forming region is observed near the galactic center. Based on the positions of the various components of the galaxy in two color diagrams and the surface brightness of the eastern arms in V filter is brighter than the western arm. From the observations, the surface brightness profiles, Ellipticity profiles, position angle profiles and color indices profiles are described and studied.
In this work the concept of semi-generalized regular topological space was introduced and studied via semi generalized open sets. Many properties and results was investigated and studied, also it was shown that the quotient space of semi-generalized regular topological space is not, in general semi-generalizedspace.
Object detection in real time is considered as a challenging problem. However, it is very important in a wide range of applications, especially in field of multimedia. The players and ball are the most important objects in soccer game videos and detecting them is a challenging task because of many difficulties, such as shadow and illumination, ball size, ball occluded by players or merged with lines, and similar appearance of players. To overcome these problems, we present a new system to detect the players and ball in real-time by using background subtraction and Sobel detection. The results were more accurate and approximately two times faster than those using only background subtraction.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the