The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art background subtraction models.
Background: Imaging techniques play a very important role in the specialty of endodontic. The ultrasonographic technique is non-expensive procedure, safe, and reproducible. The aim of the study was to determine the sensitivity, specificity, and accuracy of ultrasound and color Doppler ultrasonography in evaluation of periapical lesions (cyst, granuloma, mixed lesion “cyst within graulomas mass”, and abscess. Subject, Material and method: The sample consists of prospective study for 64 Iraqi participants who attended Karbalaa Specialized Center for Dentistry (males & females). Those patients were diagnosed clinically and radiographically as having periapical lesions of dental origin. They were examined by real time ultrasound and color
... Show MoreIn this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t
... Show MoreThe paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreThe matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single l
... Show MoreThe idea of rhythm is basically associated with movement, as it is a regular frequency of movement combining between unity and change. Rhythm can be defined as a repetition of a certain element. Rhythm has a major role in the guiding poster which we are today in dire need for in light of escalation of coronavirus pandemic and its dire repercussions on entire international community, as the current research highlights the aesthetics of color rhythm in the guiding poster to confront coronavirus pandemic.
The spread of this invisible unknown horror preoccupied the world in different fields of scientific and human knowledge to the extent that man today has started looking for effective medical solutions to put an end to this pandemic
... Show MoreFind all boils down to is marked with (recruitment aesthetic of digital technology for (color) in the film novelist) And the relationship between the aesthetic employment of digital technology for (color) and its impacts on the level of artistic creativity through digital technology and its impacts on the technical and completed the final film in the film.Search and distributed at five chapters The first chapter discusses the methodological framework of the research, which included the research problem and is as follows:What is the digital technology to enrich color in the context in the film narrative to reflect the dramatic effect?And the importance of research and its objectives, including:1 - Employment aesthetic of digital technolog
... Show MoreBackground: This clinical trial aims to evaluate the color changes of direct resin composite veneer (DCV) restorations based on spectrophotometric analysis of 4 different types of resin composites between the baseline immediately after polishing and after one year of follow-up. Materials and methods: 28 patients were assessed for eligibility for participation, aged between 18 and 38 years old, who indicated for DCV restorations in anterior maxillary teeth were considered for participation in this study. In total, 25 patients who met the inclusion criteria were selected (6 males and 19 females, mean age: 20.9 at the time of restoration placement), and 3 patients were excluded. Partic
... Show MoreA Genetic Algorithm optimization model is used in this study to find the optimum flow values of the Tigris river branches near Ammara city, which their water is to be used for central marshes restoration after mixing in Maissan River. These tributaries are Al-Areed, AlBittera and Al-Majar Al-Kabeer Rivers. The aim of this model is to enhance the water quality in Maissan River, hence provide acceptable water quality for marsh restoration. The model is applied for different water quality change scenarios ,i.e. , 10%,20% increase in EC,TDS and BOD. The model output are the optimum flow values for the three rivers while, the input data are monthly flows(1994-2011),monthly water requirements and water quality parameters (EC, TDS, BOD, DO and
... Show MoreWireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show More