Wildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (MobileNet) was trained to identify key features of various satellite images that contained fire or without fire. Then, the trained system is used to classify new satellite imagery and sort them into fire or no fire classes. A cloud-based development studio from Edge Impulse Inc. is used to create a NN model based on the transferred learning algorithm. The effects of four hyperparameters are assessed: input image resolution, depth multiplier, number of neurons in the dense layer, and dropout rate. The computational cost is evaluated based on the simulation of deploying the neural network model on an Arduino Nano 33 BLE device, including Flash usage, peak random access memory (RAM) usage, and network inference time. Results supported that the dropout rate only affects network prediction performance; however, the number of neurons in the dense layer had limited effects on performance and computational cost. Additionally, hyperparameters such as image size and network depth significantly impact the network model performance and the computational cost. According to the developed benchmark network analysis, the network model MobileNetV2, with 160 × 160 pixels image size and 50% depth reduction, shows a good classification accuracy and is about 70% computationally lighter than a full-depth network. Therefore, the proposed methodology can effectively design an ML application that instantly and efficiently analyses imagery from a spacecraft/weather balloon for the detection of wildfires without the need of an earth control centre.
Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreThis study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
BACKGROUND: The degree of the development of coronary collaterals is long considered an alternate – that is, a collateral – source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty. OBJECTIVES: Our study explores the contribution of coronary collaterals – if any exist – while considering other potential predictors, including demographics and medical history, toward the left ventricular (LV) dysfunction measured through the LV ejection fraction (LVEF). METH
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreThis study takes its importance in the area of systemic and historical
studies because it stands on presenting such aspects from the systematic
respect and now Ibn AL-Jouzy dealt with the text of this subject and how he
was exact in telling them.
Therefore, this study sheds light on the important aspects of this
method in his book through reading and studying such texts whether they had
direct or indirect relationship with this subject.
This study is not an easy task since it is based on contriving the
intellectual aspects in the methods of lbn AL-Jouzy and how he deals with the
text of this subject in its hygienic, natural and geographical aspects in
constructing a historical method in most scripts, the gen
In this paper, the exact solutions of the Schlömilch’s integral equation and its linear and non-linear generalized formulas with application are solved by using two efficient iterative methods. The Schlömilch’s integral equations have many applications in atmospheric, terrestrial physics and ionospheric problems. They describe the density profile of electrons from the ionospheric for awry occurrence of the quasi-transverse approximations. The paper aims to discuss these issues.
First, the authors apply a regularization meth