The detection of diseases affecting wheat is very important as it relates to the issue of food security, which poses a serious threat to human life. Recently, farmers have heavily relied on modern systems and techniques for the control of the vast agricultural areas. Computer vision and data processing play a key role in detecting diseases that affect plants, depending on the images of their leaves. In this article, Fuzzy- logic based Histogram Equalization (FHE) is proposed to enhance the contrast of images. The fuzzy histogram is applied to divide the histograms into two subparts of histograms, based on the average value of the original image, then equalize them freely and independently to conserve the brightness of the image. The prop
... Show MoreCrude oil still affects many countries because it is one of the essential fuel sources. It makes life more manageable in modern communities and cannot be overstated because it is easy to use and find. However, the pollution caused by its use in industries such as mining, transportation, and the oil and gas business, especially soil pollution, cannot be ignored. Soil pollution is an issue in most communities because it influences people and ecology. Accidental infusions and spills of ore oils are prevalent occurrences leading to the entire or fractional exchange of the soil pore fluid by oil-contaminated soils that have affected the geotechnical engineering properties. The liquid limitations for polluted soil grades silty loam and sa
... Show MoreCrude oil still affects many countries because it is one of the essential fuel sources. It makes life more manageable in modern communities and cannot be overstated because it is easy to use and find. However, the pollution caused by its use in industries such as mining, transportation, and the oil and gas business, especially soil pollution, cannot be ignored. Soil pollution is an issue in most communities because it influences people and ecology. Accidental infusions and spills of ore oils are prevalent occurrences leading to the entire or fractional exchange of the soil pore fluid by oil-contaminated soils that have affected the geotechnical engineering properties. The liquid limitations for polluted soil grades silty loam and sa
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThis article contains a new generalizations of Ϻ-hyponormal operators which is namely (Ϻ,θ)-hyponormal operator define on Hilbert space H. Furthermore, we investigate some properties of this concept such as the product and sum of two (Ϻ, θ)-hyponormal operators, At the end the operator equation where , has been used for getting several characterization of (Ϻ,θ)-hyponormal operators.
Our purpose in this paper is to introduce new operators on Hilbert space which is called weakly normal operators. Some basic properties of these operators are studied in this research. In general, weakly normal operators need not be normal operator, -normal operators and quasi-normal operators.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThe palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.