<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected region to produce a binary mask for the stamp area. Finally, the binary mask is combined with the original image to extract the stamp regions. The results indicate that the number of clusters can be determined dynamically and the largest cluster that has minimum standard deviation (i.e., always the largest cluster is the background cluster). Also, show that the binary mask can be established from more than one segment to cover are all stamp’s disconnected pieces and it can be useful to remove the noise appear with stamp region.</span>
The main objectives of this research is to extract essential oil from: orange ( citrus sinensis), lemon( citrus limon) and mandarin( citrus reticulata) peels by two methods: steam distillation (SD) and microwave assisted steam distillation (MASD), study the effect of extraction conditions (weight of the sample, extraction time, and microwave power, citrus peel type) on oil yield and compare the results of the two methods, the resulting essential oil was analyzed by Gas Chromatography (GC).
Essential oils are highly concentrated substances used for their flavor and therapeutic or odoriferous properties, in a wide selection of products such as foods, medicines and cosmetics. Extracti
... Show MoreIn aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show MoreSoil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreIn this study, simple, low cost, precise and speed spectrophotometric methods development for evaluation of sulfacetamide sodium are described. The primary approach contains conversion of sulfacetamide sodium to diazonium salt followed by a reaction with p-cresol as a reagent in the alkaline media. The colored product has an orange colour with absorbance at λmax 450 nm. At the concentration range of (5.0-100 µg.mL-1), the Beer̆ s Low is obeyed with correlation coefficient (R2= 0.9996), limit of detection as 0.2142 µg.mL-1, limit of quantification as 0.707 µg.mL-1 and molar absorptivity as 1488.249 L.mol-1.cm-1. The other approach, cloud point extraction w
... Show MoreRate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreCoffee is the most essential drink today, aside from water, the high consumption of coffee and the byproducts of its soluble industries such as spent coffee grounds can have a negative effect on the environment as a source of toxic organic compounds. Therefore, caffeine removal from the spent coffee ground can be applied as a method to limit the effect of its production on the environment. The aim of this study is to determine the kinetics and thermodynamics parameters and develop models for both processes based on the process parameters by using traditional solid-liquid extraction and Ultrasound-assisted extraction methods. The processes were performed at a temperature range of 25 to 55 °C for traditional and ultrasound baths, and
... Show More