Glaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma disease with 70% percentage; moreover, when the dimensions of both Optic Disc(OD) and Optic Cup(OC) were used as additional features the accuracy rate raised to 91%.
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThe efforts embedded in this paper have been devoted to designing, preparing, and testing warm mix asphalt (WMA) mixtures and comparing their behavior against traditional hot mix asphalt mixtures. For WMA preparation, the Sasobit wax additive has been added to a 40/50 asphalt binder with a concentration of 3%. An experimental evaluation has been performed by conducting the Marshall together with volumetric properties, indirect tensile strength, and wheel tracking tests to acquire the tensile strength ratio (TSR), retained stability index (RSI), and rut depth. It was found that the gained benefit of reduction in mixing and compaction temperatures was reversely associated with a noticeable decline in Marshall properties and moisture s
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreClustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value
With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreIn this study, active knife and fixed knife of single-row disc silage machine has three different clearance C1, C2 and C3 (1, 3 and 5 mm) and it is tried in three different working speed V1, V2 and V3 (1.8, 2.5 and 3.7 km / h) and PTO speed (540 min-1) and machine's fuel consumption (l/h), average power consumption (kW), field energy consumption (kW/da), product energy consumption (kW/t), field working capacity (da/h), product working capacity (t/h) and Chopping size distribution characteristics of the fragmented material were determined. It has been found that knife-counter knife clearances smaller than 3 mm (1 mm) and larger (5 mm) have a negative effect on machine performance in general. In terms of fuel and power consumptions, the m
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3