Content-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In addition, the energy, and the entropy which based on the gray level values in an image is too considered as the features. In addition to statistical approaches, models of artificial intelligence produce a desirable methodology that enhances performance in information retrieval systems, and the genetic algorithm depicts one of them. The GA is preferred for its power and because it can be used without any specific information of the domain. The experimental results conclude that using GA gives a good performance and it decreases the average search time to (60.15 milliseconds) compared with (722.25milliseconds) for traditional search.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreAbstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreMost of us are tired of the circumstances that surround us because of their deficiency, deprivation, and sullenness, even though troubles and pains are the soil in which the seeds of strong personality sprout.
The content of the research is summed up in the fact that there is no need to frown, so let our face be free, and our word good and tolerant, so that we can be the most loving people of those who give them, and the Messenger of God (may God’s prayers and peace be upon him and his family) was known to be the heaviest concerns of people, but he was most smiling of people, by smiling, we buy lives, so we should get used to it, because that gives us hope and finds the world in our hands, an
... Show MoreThis study aims to investigate the effect of changing skins material on the strength of sandwich plates with circular hole when subjected to mechanical loads. Theoretical, numerical and experimental analyses are done for sandwich plates with hole and with two face sheet materials. Theoretical analysis is performed by using sandwich plate theory which depends on the first order shear deformation theory for plates subjected to tension and bending separately. Finite element method was used to analyse numerically all cases by ANSYS program.
The sandwich plates were investigated experimentally under bending and buckling load separately. The relationship between stresses and the ratio of hole diameter to plate width (d/b) are built, by
... Show MoreThis paper aims to evaluate large-scale water treatment plants’ performance and demonstrate that it can produce high-level effluent water. Raw water and treated water parameters of a large monitoring databank from 2016 to 2019, from eight water treatment plants located at different parts in Baghdad city, were analyzed using nonparametric and multivariate statistical tools such as principal component analysis (PCA) and hierarchical cluster analysis (HCA). The plants are Al-Karkh, Sharq-Dijlah, Al-Wathba, Al-Qadisiya Al-Karama, Al-Dora, Al-Rasheed, Al-Wehda. PCA extracted six factors as the most significant water quality parameters that can be used to evaluate the variation in drinkin
This research is dedicated to study Al-Ra’ee Al-Numayri, a distinctive poetic character, to find out the most important (artistic) pre-Islamic features that contributed to its formation. It is further dedicated to know the influence of these features on his literature in the literary arena. After surveying his poetic texts and reading them according to the analytical and investigative methods, the art of the researcher was limited to the field of traditionalists. He was following the footsteps of the ancients by adhering to the traditional Arabic poetry style and the traditional poetic image. Despite that, he had his own imprints and unique style of interrogating times and places with its people, animals and plants. H
... Show More