Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for de-noising noisy CCTV images. Data-store is used tomanage our dataset, which is an object or collection of data that are huge to enter in memory, it allows to read, manage, and process data located in multiple files as a single entity. The CAN architecture provides integral deep learning layers such as input, convolution, back normalization, and Leaky ReLu layers to construct multi-scale. It is also possible to add custom layers like adaptor normalization (µ) and adaptive normalization (Lambda) to the network. The performance of the developed CAN approximation operator on the bilateral filtering noisy image is proven when improving both the noisy reference image and a CCTV foggy image. The three image evaluation metrics (SSIM, NIQE, and PSNR) evaluate the developed CAN approximation visually and quantitatively when comparing the created de-noised image over the reference image.Compared with the input noisy image, these evaluation metrics for the developed CAN de-noised image were (0.92673/0.76253, 6.18105/12.1865, and 26.786/20.3254) respectively
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreTungsten inert gas arc welding–based shaped metal deposition is a novel additive manufacturing technology which can be used for fabricating solid dense parts by melting a cold wire on a substrate in a layer-by-layer manner via continuous DC arc heat. The shaped metal deposition method would be an alternative way to traditional manufacturing methods, especially for complex featured and large-scale solid parts manufacturing, and it is particularly used for aerospace structural components, manufacturing, and repairing of die/molds and middle-sized dense parts. This article presents the designing, constructing, and controlling of an additive manufacturing system using tungsten inert gas plus wire–based shaped metal deposition metho
... Show MoreApplying a well-performing heat exchanger is an efficient way to fortify the relatively low thermal response of phase-change materials (PCMs), which have broad application prospects in the fields of thermal management and energy storage. In this study, an improved PCM melting and solidification in corrugated (zigzag) plate heat exchanger are numerically examined compared with smooth (flat) plate heat exchanger in both horizontal and vertical positions. The effects of the channel width (0.5 W, W, and 2 W) and the airflow temperature (318 K, 323 K, and 328 K) are exclusively studied and reported. The results reveal the much better performance of the horizontal corrugated configuration compared with the smooth channel during both melti
... Show MoreAbstract
This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project
... Show MoreThe electoral mechanism is remarkably clear, a political tool for institutional construction, directing political life, forming the political scene, and forming the partisan scene. This process was through the design of electoral laws, as elections in Tunisian political history represented the indicator of its slow and accelerated transformations, so The elections in Tunisia usually coincide with important political stages, accompanied by legislative or constitutional amendments in general, Islamic or secular forces have played a fundamental role in promoting the democratic experience and the principle of the peaceful transfer of power. This led to the formation of a national consensus that would help the country not enter into political
... Show MoreHome Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad
... Show More