There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into the main sixteen blocks. Each block of these sixteen blocks is divided into more to thirty sub-blocks. For each sub-block, the SVD transformation is applied, and the norm of the diagonal matrix is calculated, which is used to create the 16x30 feature matrix. The sub-blocks of two images, (thirty elements in the main block) are compared with others using the Euclidean distance. The minimum value for each main block is selected to be one feature input to the neural network. Classification is implemented by a backpropagation neural network, where a 16-feature matrix is used as input to the neural network. The performance of the current proposal was up to 97% when using the FEI (Brazilian) database. Moreover, the performance of this study is promised when compared with recent state-of-the-art approaches and it solves some of the challenges such as illumination and facial expression.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
The research tagged (the image of the soldier in contemporary Iraqi painting) dealt with the concept of the image as one of the basic concepts in the creative achievement, whether it is in the field of art, literature or beauty. Therefore, the concept of the image expanded to express the various aspects of human creativity, including the field of painting. To know the image of the soldier in contemporary Iraqi painting, the research included four chapters. The first chapter focused on the methodological framework of the research, while the second chapter included three sections. The first topic dealt with the philosophical and artistic concept of the image. The second topic was concerned with the representations of the soldier's image in
... Show MoreThe study of images in the cognitive field receives considerable attention by researchers, whether in the field of media and public relations or in other humanities. Due to the great importance in shaping trends of public opinion, especially trends that individuals and the behaviors of people, institutions or ideas are determined by forming images that they hold in their minds towards these persons or institutions. Modern enterprises have realized, whether they are governmental ministries and official departments or non-governmental organizations as civil society organizations, the importance of studying the dominant image in the minds of the masses and make decisions and draw plans to configure this image as these institutions wishes.&n
... Show Moreيهدف هذا البحث الى تصميم قائمة بمؤشرات القيم العلمية والاخلاقية التي ينبغي توافرها في محتوى كتاب الحاسوب للصف الثاني المتوسط، وتحليل محتوى الكتاب المذكور آنفاً وفقاً لها، وذلك عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر القيم العلمية والأخلاقية في محتوى كتاب الحاسوب المُعد لطلبة الصف الثاني المتوسط الصادر من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي ( 2017-2018) م؟ ولتحقيق هدفا البحث أ
... Show Moreيهدف هذا البحث الى تصميم قائمة بمؤشرات القيم العلمية والاخلاقية التي ينبغي توافرها في محتوى كتاب الحاسوب للصف الثاني المتوسط، وتحليل محتوى الكتاب المذكور آنفاً وفقاً لها، وذلك عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر القيم العلمية والأخلاقية في محتوى كتاب الحاسوب المُعد لطلبة الصف الثاني المتوسط الصادر من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي ( 2017-2018) م؟ ولتحقيق هدفا البحث أ
... Show MoreThe availability of statistical data plays an important role in planning process. The importance of this research which deals with safety of statistical data from errors and outliers values. The Objective of this study is to determine the outlier values in statistical data by using modern exploratory data methods and comparing them with parametric methods. The research has been divided into four chapters ,the main important conclusions reached are:1-The exploratory methods and the parametric methods showed variation between them in determining the outlier values in the data.
2-The study showed that the box plot method was the best method used in determining
... Show MoreAmong many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More