The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreThe developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei
... Show MoreBecause of its importance in the world, Middle East area is one of the competition areas between the major and great powers. Among those powers are Russia and United states of America. The competition between these two powers to control Syria is greatly clear since 2011. It is also one of the most important subject in the international politics. This importance comes from the importance of Russia and the United States of America besides importance of the Middle East. At the end of the cold war, United States of America maintained its role in the international system and became the only pole that dominated the international affairs while Russia tried to overcome the challenges inherited from the former Soviet Union, and it succeeded in th
... Show MoreThis study examined the problem of identifying the vocabulary of the methodology of teaching Arabic language in the faculties of Media. The researcher noticed the existence of an overlap between the syllabuses of the general specialization of the Arabic language and its Media sections in the universities with the special professional vocabulary that suits the study of the media student. Thus ,this study is regarded as a real attempt to present a methodological model of media language that concerns with fillfuling students ‘linguistic and knowledgeable needs relying on measuring their benefits from the methodological Arabic curriculum . Key words:problem, teaching’ methodology of Arabic language, media language.
... Show Moreobjective the research to diagnosis and interpretation of the nature of the effect between the basic elements of knowledge management (tecgnology , structure , culture , process , human resource ) and the strategic performance of the Iraqi private banks, the research community and the level dimensions, and I've tested this research in the private banking sector represented by (7), especially in Baghdad, Iraqi banks, and applied research on sample consisting of 100 distributors in several administrative levels Director (Director, Director of the department, branch manager), and use the researcher questionnaire Head to collect data and information tool, and some private banks annual reports, has sought research to test
... Show Moreتشهد بیئة الأعمال المعاصرة جملة من التغیرات والتطورات التكنولوجیة وتزایداً في حدةالمنافسة، وأتساع الفجوة بین العاملین والإدارة ، وقدرة الإدارة على التمییز بین الموظفین، والمشاركة فيإتخاذ القرارات، الامر الذي یلقي على عاتق شركة التأمین إجراء التغییر التنظیمي لتحقیق تطور فيالخدمات التأمینیة التي تقدمها للجمهور من تنوع التغطیات التأمینیة )الوثائق( والسرعة في تسویةالتعویضات وغیرها من الانشطة التي تمارسه
... Show MoreThe post-Corona Covid-19 world is not the world before it, the problem of perception of personality traits with two axes: the characteristics of psychological and social compatibility, and the second aspect the mental disorder during the pandemic, and the accompanying precautions and prohibitions during the academic year 2020 AD. The aim of the research is to reveal the perception of the personal characteristics of Bisha University employees (students and faculty) during the Corona Covid-19 pandemic, and to reveal statistically significant differences in the perception of the personality traits of Bisha’s members during the Covid 19 according to the scientific qualification variables (female students -faculty members), marital st
... Show MoreThe current research aims to identify: 1. The level of mathematical construct among the Department of Mathematics students in the colleges of education and basic education. 2. The level of effective mathematical operations in both sides of the brain at the Department of Mathematics students in the colleges of education and basic education. 3. The strength and direction of the correlation between the mathematical construct and effective mathematical operations on both sides of the brain at the Department of Mathematics students in the colleges of Education and Basic Education. To investigate the research objectives, the researcher formulated zero-main hypothesis for each aim and from the same hypothesis, three sub-zero hypotheses are deri
... Show MoreImage segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima