Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CNN infrastructure. Findings: The results acquired through the investigated CBIR system alongside the benchmarked results have clearly indicated that the suggested technique had the best performance with the overall accuracy at 88.29% as opposed to the other sets of data adopted in the experiments. The outstanding results indicate clearly that the suggested method was effective for all the sets of data. Improvements/Applications: As a result of this study, it was found the revealed that the multiple image representation was redundant for extraction accuracy, and the findings from the study indicated that automatically retrieved features are capable and reliable in generating accurate outcomes.
This research discusses the subject of identity in the urban environment as it attempts to answer a number of questions that come with the concept of identity. The first of these questions: What is identity? Can a definition or conceptual framework be developed for identity? What about individual, collective, cultural, ethnic, political and regional identity? Is there a definition of identity in the urban environment in particular? If there is a definition of identity, what about social mobility responsible for social change? How can we see identity through this kinetics? Can we assume that identity in the urban environment has a variable structure or is of variable shape with a more stable structure? Can we determine the spatial-tempora
... Show MoreThe study aimed to find out the relationship between the dimensions of internal control systems and the availability of an effective governance framework in the Sudanese banks. The study used descriptive and analytical method for collecting and analyzing the study data using SPSS program. The questionnaire was used as an analysis tool. The target sample of Sudanese bank employees, the study found several results, including that the bank avoids methods that lead to the rational use of available resources, and identifies and separation of tasks among employees, in addition to rapid response to reports The study found several recommendations, including the need for a list of banks that are sufficiently flexible and comp
... Show MoreBanks face many of the various risks: which are of dangerous phenomena that cause the state achieved a waste of money and a threat to future development plans to be applied to reach the goals set by: prompting banks and departments to find appropriate solutions and fast: and it was within these solutions rely on Banking risk management and effective role in defining and identifying: measuring and monitoring risk and trying to control and take risks is expected to occur in order to encircle and make it in within acceptable limits: and try to avoid them in the future to reduce the losses that are likely to be exposed to the bank: and it began to emerge and dominate a lot of legislation that seeks to structure the year risk management and t
... Show MoreWith the development of modern mass media and the prevalence of use continues to both researchers and practitioners their efforts to understand how the media affect Hzha on both the individual and the institutions, society and culture as a whole, which means that the need to develop models and theories explain and predict the effects of the use of such means, therefore, the study of modern technologies of communication and information as an area of research has become mature to establish the intellectual base cohesive, but they are not mature enough, which calls for more research developments therefore become social networking sites online, (Facebook, and YouTube, and straining) known today as the new social media, which is witness
... Show MoreThis research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.
Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f
... Show MoreFuture wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show MoreThe fluctuation properties of energy spectrum, electromagnetic transition intensities and electromagnetic moments in nucleus are investigated with realistic shell model calculations. We find that the spectral fluctuations of are consistent with the Gaussian orthogonal ensemble of random matrices. Besides, we observe a transition from an order to chaos when the excitation energy is increased and a clear quantum signature of the breaking of chaoticity when the single-particle energies are increased. The distributions of the transition intensities and of the electromagnetic moments are well described by a Porter-Thomas distribution. The statistics of electromagnetic transition intensities clearly deviate from a Porter-Thomas distribution (i
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreIn this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes
... Show More