The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images instead of huge images with the same parameters. This provides users in social media with efficient tools to search their images and establish a database or a collection of special images to their interests. Experiments using face detection and background notice based indexing techniques support the idea that the proposed algorithm achieves significantly better results in terms of computing cost. This technology will support control the explosion of media-rich content by offering users an efficient automated image indexing and retrieval tool for compressed images on the Internet
In this work the corrosion behavior of Ti-6Al-4V alloy was studied by using galvanostatic measurements at room temperature in different media which includ sodium chloride (food salt), sodium tartrate (presence in jellies, margarine, and sausage casings,etc.), sodium oxalate (presence in fruits, vegetables,etc.), acetic acid (presence in vinegar), phosphoric acid (presence in drink), sodium carbonate (presence in 7up drink,etc.), and sodium hydroxide in order to compare.
Corrosion parameters were interpreted in th
... Show MoreInterested in many scholars and reseachers the subject of the media and means varied his roleinfluential in the definition of the public of issues and political, cultural, social and because of its spread wide and ability to address the people of all levels effect them in the formation consciousness of those issues and types of this awareness is an awareness of the tax, contribute to media formation consciousness tax through the definition of people what tax and importance of the role of its revenues to supplement the state budget by posting tax laws and regulations of applied and all what respect process account tax, to be in charge of the tax familiar enough about this, which avoid being cheated taxmisleading when rev
... Show MoreHas influenced technology contact on social values in the Arab community in general and
the Iraqi community in particular whether this positive change or a negative effect on the level
of the individual and society is reflected this influence through socialization and human
relations as well as the behavior of individuals and dealing with others, where the world was
to soon pass changes slow, and the amounts that can be measured and trends can be calculated
and the effect of points can be identified and controlled, but the technological changes and
openness cognitive features that seemed evident in the last decade of the twentieth century
brought about a change in all scales and distances traditional considerations.<
The great raise and development of residential buildings in modern cities worldwide as a result of urban extends leads to environmental and social problems, that make the designers looking for more complicated and innovative solutions. To encounter these, most advanced technologies in construction had been used resulting buildings had become higher, which was moved away from the land called residential housing. And with the development of these buildings, increase in the inhabitants inside; generate distant from nature, which increased the need for interactive outdoor recreational spaces open green in its high sections, was an alternative or complementary option to outer space at the ground level. Therefore, the research problem has emer
... Show MoreSocial variables have a tremendous impact on the language spoken by the male and female genders, particularly in Eastern cultures. Because men and women in Arabic cultures are typically raised separately, they speak somewhat differently depending on their gender. Arabic is used exclusively in educational institutions in the Arab world. The objective of the present study was to examine certain social and linguistic aspects of the language spoken by females and males in mixed academic organisations from the point of view of female academics. It also examined some noted gender differences in previous gender studies of the interactional styles of the two genders in higher education institutions in Iraq from the perspective of f
... Show MoreThe current research aims to know the measurement of the fifth- secondary stage female students' affliction with the social phobia . The research is confined to General directorate of Education in Baghdad / Al-Karkh/2 / for the academic year 2015-2016 and fifth-secondary stage female students. It has been used descriptive method and exposed theoretical sides and previous studies concerning with the social phobia.The procedures of the research include the application of the social phobia scale on random sample of fifth- secondary stage female students ( both branches scientific and literary). The current study has concluded that the fifth- secondary stage female students have&nbs
... Show MoreThe current article focuses on studying the social organization reality of the Iraqi society; it aims to construct an Iraqi organized personality that believe in the principles of Islamic religion by making use of the sociology thoughts in explaining the strength of social organization, and the causes of social deviance in attempt of decreasing the deviance and strengthening the cohesion of Iraqi character.
The researchers put forward some questions: to what extent the western theoretical pattern can succeed in explaining the social organization of the Iraqi society? What is the more appropriate western theory for diagnosing the cohesion and deviance of the society? What is the s
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreGroupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is eff
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show More