Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for de-noising noisy CCTV images. Data-store is used tomanage our dataset, which is an object or collection of data that are huge to enter in memory, it allows to read, manage, and process data located in multiple files as a single entity. The CAN architecture provides integral deep learning layers such as input, convolution, back normalization, and Leaky ReLu layers to construct multi-scale. It is also possible to add custom layers like adaptor normalization (µ) and adaptive normalization (Lambda) to the network. The performance of the developed CAN approximation operator on the bilateral filtering noisy image is proven when improving both the noisy reference image and a CCTV foggy image. The three image evaluation metrics (SSIM, NIQE, and PSNR) evaluate the developed CAN approximation visually and quantitatively when comparing the created de-noised image over the reference image.Compared with the input noisy image, these evaluation metrics for the developed CAN de-noised image were (0.92673/0.76253, 6.18105/12.1865, and 26.786/20.3254) respectively
The ability of using aluminum filings which is locally solid waste was tested as a mono media in gravity rapid filter. The present study was conducted to evaluate the effect of variation of influent water turbidity (10, 20and 30 NTU); flow rate(30, 40, and 60 l/hr) and bed height (30and60)cm on the performance of aluminum filings filter media for 5 hours run time and compare it with the conventional sand filter. The results indicated that aluminum filings filter showed better performance than sand filter in the removal of turbidity and in the reduction of head loss. Results showed that the statistical model developed by the multiple linear regression was proved to be
valid, and it could be used to predict head loss in aluminum filings
Abstract
This work deals with a numerical investigation to evaluate the utilization of a water pipe buried inside a roof to reduce the heat gain and minimize the transmission of heat energy inside the conditioning space in summer season. The numerical results of this paper showed that the reduction in heat gain and energy saving could be occurred with specific values of parameters, like the number of pipes per square meter, the ratio of pipe diameter to the roof thickness, and the pipe inlet water temperature. Comparing with a normal roof (without pipes), the results indicated a significant reduction in energy heat gain which is about 37.8% when the number of pipes per m
... Show MoreLattakia city faces many problems related to the mismanagement of solid waste, as the disposal process is limited to the random Al-Bassa landfill without treatment. Therefore, solid waste management poses a special challenge to decision-makers by choosing the appropriate tool that supports strategic decisions in choosing municipal solid waste treatment methods and evaluating their management systems. As the human is primarily responsible for the formation of waste, this study aims to measure the degree of environmental awareness in the Lattakia Governorate from the point of view of the research sample members and to discuss the effect of the studied variables (place of residence, educational level, gender, age, and professional status) o
... Show MoreIn this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show MoreElectrical Discharge Machining (EDM) is a widespread Nontraditional Machining (NTM) processes for manufacturing of a complicated geometry or very hard metals parts that are difficult to machine by traditional machining operations. Electrical discharge machining is a material removal (MR) process characterized by using electrical discharge erosion. This paper discusses the optimal parameters of EDM on high-speed steel (HSS) AISI M2 as a workpiece using copper and brass as an electrode. The input parameters used for experimental work are current (10, 24 and 42 A), pulse on time (100, 150 and 200 µs), and pulse off time (4, 12 and 25 µs) that have effect on the material removal rate (MRR), electrode wear rate (EWR) and wear ratio (WR). A
... Show MoreThe interest in green energy in recent years is very noticeable, as this energy is a very important alternative that can replace fuel in many applications, most notably electric power generation, so work must be done to develop a form of this energy such as wind energy by working on the development of turbines. The DMST method provided by Qblade software is an integrated tool for making a simulation of a vertical axis wind turbine (VAWT). The simulation was carried out on vertical axis wind turbines, designing turbine blades according to symmetrical NACA0018, and calculating some parameters such as power, torque and power coefficient. It is found that this type of turbine can be improved by treating the blade edges that cont
... Show MoreWastewater treatment plants operators prefer to make adjustments because they are more cost effective, to use the existing tank instead of building new ones. In this case an imported materials would be used as bio-loads to increase biomass and thus maintain efficiency as the next organic loading increases.In the present study, a local substance "pumice stone" was used as a biological carrier in the aeration tank, and the experiments were carried out in five stages: without biological carriers, filling ratio of 4%,10%,20%, and25% with pumice stone, the maximum organic loading at each stage (1.1884, 1.2144, 1.9432, 2.7768, 3.3141)g BOD /l.d respectively.Other experiments were carried out to determine the best filling ratio, the SS remova
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show More