In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performance measures are used as a criterion to decide which classifier is the best one to detect the images with high accuracy. Eventually, the simulation results show that each classifier detect the damage/no damage image with different performance measures and then makes it easy to select the best one.
Breast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o
... Show MoreThe objective of the study was to identify the effectiveness of a training program based on the employment of the educational portal in the development of the skills of the administrative body in the basic education schools in Dhofar Governorate. To achieve the goal, a training program was designed that includes the skills of the educational portal to be met by the administrative body and measuring its effectiveness. A questionnaire to identify training needs, and a notecard to evaluate performance. The study sample consisted of (70) individuals of the administrative staff. The researchers used the descriptive-analytical method to identify the training needs, design and build the training program and the experimental method for applying
... Show MoreInˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.
in recent years cryptography has played a big role especially in computer science for information security block cipher and public
Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.
We present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.
Steady natural convection in a square enclosure with wall length (L= 20 cm) partially filled by saturated porous medium with same fluid (lower layer) and air (upper layer) is investigated. The conceptual study of the achievements of the heat transfer is performed under effects of bottom heating by constant heat flux (q=150,300,450,600W/m2 ) for three heaters size (0.2,0.14,0.07)m with symmetrically cooling with constant temperature on two vertical walls and adiabatic top wall. The relevant filled studied parameters are four different porous medium heights (Hp=0.25L,0.5L, 0.75L, L), Darcey number (Da1) 3.025×10-8 and (Da2) 8.852×10-4 ) and Rayleigh number range (60.354 - 241.41), (1.304×106 – 5.2166×106 ) for Da1 and Da2 cases respecti
... Show MoreWe present a simple model of charge transfer current through sensitizer N3 molecule contact to TiO2 and ZnO semiconductors to calculate the charge transfer current. The model underlying depends on the fundamental parameters of the charge transfer reaction and it is based on the quantum transition theory approach. A transition energy, driving energy and potential barrier have been taken into account charge transfer current at N3 / TiO2 and N3 / ZnO devices with wide polarity solvents Acetic acid, 2-Methoxyethanol, 1-Butanol, Methyl alcohol, chloroform, N,N-Dimethylacetamide and Ethyl alcohol via the quantum donor-acceptor system.The effects of the transition energy and potential barrier are computed and discussion on charge transfer current.
... Show More