Fluidization process is widely used by a great assortment of industries worldwide and represents a trillion dollar industry [6]. They are currently used in separation, classification, drying and mixing of particles, chemical reactions and regeneration processes; one of these processes is the mass transfer from an immersed surface to a gas fluidized bed
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
The picture has taken a place that sometimes enables it to take precedence over media analysis، psychology، and political communication.
The image has the ability to influence to obtain persuasion، not only emotionally or
dramatically، but also on the level of commercial and political persuasion. In every
image، the intention of that persuasion is hidden.
It can be identified by a set of underlying dimensions such as vitality، social dominance، and confidence، for which a group of specific suggestions or movements، such
as a smile، the movement of hands، or the nature and way of looking with the eyes، is
established. The visual image often precedes its verbal counterpart in the proce
The primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes
Herein, an efficient inorganic/organic hybrid photocatalyst composed of zeolitic imidazolate framework (ZIF-67) decorated with Cd0.5Zn0.5S solid solution semiconductor was constructed. The properties of prepared ZIF- [email protected] nanocomposite and its components (ZIF-67 and Cd0.5Zn0.5S) were investigated using XRD, FESEM, EDX, TEM, DRS and BET methods. The photocatalytic activity of fabricated [email protected] nanocomposite were measured toward removal of methyl violet (MV) dye as a simulated organic contaminant. Under visible-light and specific conditions (photocatalyst dose 1 g/l, MV dye 10 mg/l, unmodified solution pH 6.7 and reaction time 60 min.), the acquired [email protected] photocatalyst showed advanced photocatalytic activity
... Show MoreThe Results Of Interest In Capitals And Major Cities Have Become Major Attraction Centers For People In Rural Areas And Different Regions, Especially With The Concentration Of Industrial And Commercial Establishments And Public Services, Which Helped To Find The Wide Differences Between Them. Recently, The Trend To Develop Small Urban Centers In Rural Back Areas Great And Serious Attempt To Reduce Inflation. The Suburb Of Abu Ghraib Is One Of The Important Suburbs Near The City Of Baghdad And Through The Study Of The Reality Of The Suburb Shows That The Outcome Of Its Career And Urban Development Lies In Its Mutual Relationship With The City Of The Mother In The Light Of Considerations And Measures Of The Most Important Accessibility And
... Show MoreThe COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreUncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image
... Show More