In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
Tourism is a human phenomenon and economic and social activity. It represents an effective forces in the life of the individuals and state alike. As any other economic and human activity has appositive and negative results.
So there is a necessary to planning and activate this sector to get the most possible advantage.
Tourism has special importance out of its effect on the structure and performance of national economy. It can be regarded a dynamic activity with mutual effect include all the economic activities within and out the state. Tourism is affected and affect the production con summing , joineries , communication , ports ,hotel , restaurants ,internal and
... Show MoreThe implementation of decentralization in Iraq was asymmetrical, leading to different forms and paces of implementation. Comparing four cases of Basra, Kirkuk, Nineveh, and Sulaymaniyah indicate that these cases differ in their political stability and autonomy in a way that led to a different forms of decentralization. This paper argues that the higher the level of political autonomy from the federal government, the more efficient the governance model, and the more efficient the governance model, the more legitimate the system (trust), and the more legitimate a system, the more accountable elected officials. Therefore, it recommends reforming the institutional setup of decentralization by having districts, instead of provinces, as the bu
... Show MoreFG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More