This paper presents an algorithm and then MATLAB program that can construct and process an image depending on a given database and face recognition technique, which helps in the operations of investigation issues for ...This paper presents an algorithm and then MATLAB program that can construct and process an image depending on a given database and face recognition technique, which helps in the operations of investigation issues for policemen and in any similar operations, the image gets constructed and implemented as the database is developed. It is found that such image processing operation helps in operations needs quick investigation transactions of some issues like policemen works and operations. The method depends on the given database about the face of the person, the face recognition depends on drawing a face of the given data and then comparing the resulted face with the stored data and find the most closes one and choose it to be its goal. This operation needs a time, it is not real-time operation but the time needed is too short. This method develop a method to make the operation of searching about some unknown person or face faster which helps more all sectors interested in searching about some unknowns in their transactions.展开更多
Error coding is suited when the transmission channel is noisy. This is the case of wireless communication. So to provide a reliable digital data transmission, we should use error detection and correction algorithms. I...Error coding is suited when the transmission channel is noisy. This is the case of wireless communication. So to provide a reliable digital data transmission, we should use error detection and correction algorithms. In this paper, we constructed a simulation study for four detection algorithms. The first three methods—hamming, LRC, and parity are common techniques in networking while the fourth is a proposed one called Signature. The results show that, the hamming code is the best one in term of detection but the worst one in term of execution time. Parity, LRC and signature have the same ability in detecting error, while the signature has a preference than all others methods in term of execution time.展开更多
文摘This paper presents an algorithm and then MATLAB program that can construct and process an image depending on a given database and face recognition technique, which helps in the operations of investigation issues for policemen and in any similar operations, the image gets constructed and implemented as the database is developed. It is found that such image processing operation helps in operations needs quick investigation transactions of some issues like policemen works and operations. The method depends on the given database about the face of the person, the face recognition depends on drawing a face of the given data and then comparing the resulted face with the stored data and find the most closes one and choose it to be its goal. This operation needs a time, it is not real-time operation but the time needed is too short. This method develop a method to make the operation of searching about some unknown person or face faster which helps more all sectors interested in searching about some unknowns in their transactions.
文摘Error coding is suited when the transmission channel is noisy. This is the case of wireless communication. So to provide a reliable digital data transmission, we should use error detection and correction algorithms. In this paper, we constructed a simulation study for four detection algorithms. The first three methods—hamming, LRC, and parity are common techniques in networking while the fourth is a proposed one called Signature. The results show that, the hamming code is the best one in term of detection but the worst one in term of execution time. Parity, LRC and signature have the same ability in detecting error, while the signature has a preference than all others methods in term of execution time.