The research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreA band rationing method is applied to calculate the salinity index (SI) and Normalized Multi-Band Drought Index (NMDI) as pre-processing to take Agriculture decision in these areas is presented. To separate the land from other features that exist in the scene, the classical classification method (Maximum likelihood classification) is used by classified the study area to multi classes (Healthy vegetation (HV), Grasslands (GL), Water (W), Urban (U), Bare Soil (BS)). A Landsat 8 satellite image of an area in the south of Iraq are used, where the land cover is classified according to indicator ranges for each (SI) and (NMDI).
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreMusicality is a fundamental feature of poetry that takes the interest of scholars and critics. Most poets rely on a variety of literary devices and techniques to bring music to their work like rhymes - words that appear at the end of lines in poetry - and on arranging words techniques in such a way to create a pseudo melody, which is achieved primarily by patterning (or repeating) certain sounds. Such a poetic rhetorical and verbal enhancer’s aspect represented ever since the beginning of the classical poetry has been manifested more evidently in Nali’s poetry. His poetry is marked with particular letters that have played a substantial role in the rhyming that rings like cymbals or jingle like internal elevated rhymes. Within a descr
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreBackground: As photochemical reaction that can stiffen the cornea, CXL is the only promising method of preventing progression of keratectasia such as KC and secondary ectasia following refractive surgery. The aim of CXL is to stabilize the underlying condition with a small chance of visual improvement. Objective: To show the sequences of changes in visual acuity and topographic outcomes during 1 year post CXL for patients with progressive Keratoconus.Type of the study: Cross sectional studyMethods: CXL procedure was done for 45 eyes with progressive KC. The following parameters had been monitored pre operatively, 1, 3, 6 and 12 months postoperatively: K apex, K2, corneal thickness at thinnest location, anterior and posterior elevation po
... Show MoreArabic prose poem and the antithesis of contrast: poetry _ prose and West _ East
The Sufi poetry of Ibn Al-Faridh represents a true image of the spiritual experience, in which he presented the bright aspects of his experience, and his suffering in it, by formulating it in a poetic form, because the Sufi poetry is the result of an experience in which the Sufi seeks to achieve his goal of reaching the truth, and this is why Ibn Al-Faridh made his poetry a tool for expression on his own experience, the poet reflected his Sufi life in which he moved rhymes and weights.
The poet Ibn Al-Faridh stands as a witness to his making of Sufi poetry in the service of the purpose of who said, it is the embodiment of the Sufi journey in the stages, and the fluctuation in the places and si
... Show More