This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spent to achieve the best classification accuracy.
The ideas and information obtained by the viewer in the cinema have always been the source of the visual image, but that doesn’t negate the fact that the mental image can produce a lot of the information and ideas in the cinematic art and the most important means to achieve this mental image in the film is the eloquent cinematic sound. This research is conducted to show this important and effective contribution of the sound in the production of the mental image. Hence the importance of this research is in that it addresses an important issue which is the eloquent performance of the sound and its role in the production of the mental image inside the space of the feature film. This research concerns those working the field of cinema and
... Show MoreDetection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreSeveral directional wells have been drilled in Majnoon oilfield at wide variation in drilling time due to different drilling parameters applied for each well. This technical paper shows the importance of proper selection of the bit, Mud type, applied weight on Bit (WOB), Revolution per minute (RPM), and flow rate based on the previous wells drilled. Utilizing the data during drilling each section for directional wells that's significantly could improve drilling efficiency presented at a high rate of penetration (ROP). Based on the extensive study of three directional wells of 35 degree inclination (MJ-51, MJ-52, and MJ-54) found that the applied drilling parameters for MJ-54 and the bit type within associated drilling parameters to drill
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore
... Show MoreScenes of love constitute a large space within the orbit of the movies, so that there is almost no film (no matter what kind) void of these scenes, as they are associated with many dimensions and they constitute a major attraction for viewers, and thus the direction solutions and their connection to the director's vision constitute a large part in the process of employing signs to highlight what should be highlighted or to refer to it symbolically on the grounds that the director does not have full freedom in the transfer of scenes of love at all levels as they are in reality. The research included three sections within the theoretical framework:The first section: the concept of image and its rhetorical importance. This section discussed
... Show MoreDeveloping and researching antenna designs are analogous to excavating in an undiscovered mine. This paper proposes a multi-band antenna with a new hexagonal ring shape, theoretically designed, developed, and analyzed using a CST before being manufactured. The antenna has undergone six changes to provide the best performance. The results of the surface current distribution and the electric field distribution on the surface of the hexagonal patch were theoretically analyzed and studied. The sequential approach taken to determine the most effective design is logical, and prevents deviation from the work direction. After comparing the six theoretical results, the fifth model proved to be the best for making a prototype. Measured results rep
... Show More