The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art background subtraction models.
The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreModern digital technologies have affected the means of communication in terms of structure, function and methods of dealing with them, and the communication process has changed, becoming bilateral, reciprocal and interactive, after it was one-way and limited in circulation and the roles changed, so the receiver became the sender and reversed is correct, and the culture of the active user and the participant spread, and the communication process became continuous.
The international information network has provided new electronic channels in the media and communication that are not known and opened a new era for these means, which led to a trend towards digital media in an unprecedented way.
The new communication platforms are the re
In line with the most recent trends in genre analysis (Swales, 1990; Bahatia,
1993) and discourse studies on business communication (Dudley-Evans and St.
John, 1998;Bargiela-Chiappini, F. and C. Nickerson, 1999, the article focuses on a
particular financial genre, Bank's Annual Reports (ARs). More in detail, in contrast
in widespread claim about the purely financial and informative nature of ARs,
addressing experts only, this paper aims at illustrating in accordance with Bexley
and Hynes (2003), and Burrough's (1986) considerations, that those reports
endeavour to promote the company image and to leave a positive impression on
readers. Generally speaking, companies communicate because they exist: they have
a na
General survey for wheat rust diseases in Iraqi fields was done during the seasons of 2010, 2011 and 2012. The survey covered different fields in southern, middle and northern regions. Results of the first season indicated that most of Iraqi cultivars such as Tmmoze2, IPA 99 and Mexipak showed different types of susceptibility to both yellow and leaf rust infection. Disease severity increased when the conditions were favorable for infections with using susceptible cultivars. The severity of leaf rust was less in the north region comparing with the middle and south regions. Most of the introduced cultivars such as Sham6 and Cimmyto showed susceptible reaction to yellow and leaf rust. Yellow rust was in epiphytotic form at the Iraqi-Syrian-Tu
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSediment samples were collected from main water processing and supply plants in Baghdad, and tested for radioactivity from both natural and artificial sources. These stations are: East Dijla (Tigris), Al-Kadisia, Al-Karama, Al-Rasheed, Al-Sader, Al-Wathba, and Al-Wihda supply stations. Qualitative measurements were made, and the results showed that most sediments exhibited natural radioactive level and sometimes less than the international regular standards. Specially, K-40 and Ra-226 results were much less than the standards for radioactive concentrations. Ac-228 concentration was found rather than Th-232 (in Al-Sader and Al-Wihda samples) but with low concentrations of about 10-15 Bg/kg and detection confidence ~45% , and Ce-141 and Be
... Show MoreSewage sludge samples were collected from Al-rasafa and Al-karkh refinement stations which represent the main stations of Baghdad city. Samples were collected from all treatment stages: before, after, and during refinement processes. The High Purity Germanium Coaxial Detector system with energy resolution 1.8 keV for energy line 1333 keV of Co – 60 radioactive sources was used to measure radioactivity from both natural and artificial sources. GENIE – 2000 analysis the results statistically and qualitatively. The results showed that all sewage sludge samples exhibited natural radioactive level and sometimes less than the international regular standards, but Al–Karkh station showed increment in radioactive levels than Al– Rasa
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima