There is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that it operates on a big number of key-points, the only drawback it has is that it is rather time consuming. In the suggested approach, the system deploys SIFT to perform its basic tasks of matching and description is focused on minimizing the number of key-points which is performed via applying Fast Approximate Nearest Neighbor algorithm, which will reduce the redundancy of matching leading to speeding up the process. The proposed application has been evaluated in terms of two criteria which are time and accuracy, and has accomplished a percentage of accuracy of up to 100%, in addition to speeding up the processes of matching and description.
The optical detectors which had been used in medical applications, and especially in radioactive treatments, need to be modified studied for the effects of radiations on them. This study included preparation of the MnS thin films in a way that vacuum thermal evaporation process at room temperature 27°C with thickness (400+-10nm) nm and a sedimentation rate of 0.39nm/sec on glass floors. The thin films prepared as a detector and had to be treated with neutron irradiation to examine the results gained from this process. The results decay X-ray (XRD) showed that all the prepared thin films have a multi-crystalline structure with the dominance of the direction (111), the two samples were irradiated with a neutron irradiation source (241Am-9Be)
... Show MoreAb – initio density function theory (DFT) calculations coupled with Large Unit Cell (LUC) method were carried out to evaluate the electronic structure properties of III-V zinc blend (GaAs). The nano – scale that have dimension (1.56-2.04)nm. The Gaussian 03 computational packages has been employed through out this study to compute the electronic properties include lattice constant, energy gap, valence and conduction band width, total energy, cohesive energy and density of state etc. Results show that the total energy and energy gap are decreasing with increase the size of nano crystal . Results revealed that electronic properties converge to some limit as the size of LUC increase .
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreElzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe Field Programmable Gate Array (FPGA) approach is the most recent category, which takes the place in the implementation of most of the Digital Signal Processing (DSP) applications. It had proved the capability to handle such problems and supports all the necessary needs like scalability, speed, size, cost, and efficiency.
In this paper a new proposed circuit design is implemented for the evaluation of the coefficients of the two-dimensional Wavelet Transform (WT) and Wavelet Packet Transform (WPT) using FPGA is provided.
In this implementation the evaluations of the WT & WPT coefficients are depending upon filter tree decomposition using the 2-D discrete convolution algorithm. This implementation w
... Show MoreConstructing The Psychological Tranquility Scale of the University of Baghdad Students
The research aimed to :
- Constructing the Psychological Tranquility Scale of the University of Baghdad Students.
- Appointing the psychological content standard for the accepting Answer of student about the scale.
The research Sample was (414) boy and girl from Baghdad University Students for the Studying year (2008-2009), So the Scale of the Psychological Tranquility Scale was bilt on them in good psychometric properties from truth Factor analyzing which was its super saturation was reached to (50) item from its items a value more than the super sutution norm (0,30) for kaizer, also the firm value was Relaibility for the scale by the way
The possibility of using the magnetic field technique in prevention of forming scales in heat exchangers pipes using
hard water in heat transfer processes, also the studying the effective and controllable parameters on the mechanism of
scale formation.
The new designed heat exchanger experimental system was used after carrying out the basic process designs of the
system. This system was used to study the effect of the temperature (40-90 °C) and water flow rate (0.6-1.2 L/min) on
the total hardness with time as a function of precipitation of hardness salts from water and scale formation.
Different magnetic field designs in the heat exchanger experimental system were used to study the effect of magnetic
field design a