Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.
In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
Landsat7 of Enhanced thematic mapper plus (ETM+) was launched on April 15, 1999. Four years later, images start degrading due to the scan line corrector (SLC). SLC is a malfunction that results in pixel gaps in images captured by the sensor of Landsat7. The pixel gap regions extend from about one pixel near the image center and reach up to about 14 pixels in width near the image edge. The shape of this loss is like a zigzag line; however, there are different studies about repairing these gaps. The challenge of all studies depends on retrieving inhomogeneous areas because the homogenous area can be retrieved quickly depending on the surrounding area. This research focuses on filling these gaps by utilizing pixels around them
... Show MoreThe administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce costs) to prove the hypothesis has sought research to achieve its goal of Alkadivh and Alkoppelan &nb
... Show MoreThe study aims to identify the psychological, social, and academic problems that encounter students at the college of education. To this end, the researcher utilized the descriptive approach, where a questionnaire was used as a tool to collect the study data. The findings of study revealed that the main academic problems are inability to understand what the students read, lack of concentration over the process of studying. The Difficulty of preparation for test. Lack of ability to memorize quickly. As for the prominent social problems: the excessive usage of social media that drove students away from their main tasks, the Lack of participation in social activities, the scarcity the religious information. The psychological problems includ
... Show MoreThis paper presents an alternative method for developing effective embedded optimized Runge-Kutta (RK) algorithms to solve oscillatory problems numerically. The embedded scheme approach has algebraic orders of 5 and 4. By transforming second-order ordinary differential equations (ODEs) into their first-order counterpart, the suggested approach solves first-order ODEs. The amplification error, phase-lag, and first derivative of the phase-lag are all nil in the embedded pair. The alternative method’s absolute stability is demonstrated. The numerical tests are conducted to demonstrate the effectiveness of the developed approach in comparison to other RK approaches. The alternative approach outperforms the current RK methods
... Show MoreOne of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show MoreAbstract
The purpose of this research is to develop a proposed framework for achieving the Integration of the Target Cost and Resource Consumption Accounting Techniques and to show the role they play in reducing products costs and supporting the competitive advantage to cope with contemporary changes. To achieve this goal, the researchers followed the analytical method using the statistical questionnaire as a means of collecting data from the research sample include accounting, administrative, technical, engineering staffs and others. The research sample consists of (56) individuals and for the purpose of conducting statistical analysis of the data and testing hypotheses, the statistical program (SPSS) wa
... Show MoreBegan the process of re-engineering processes in the private sector as a way to assist organizations in re-thinking how to run the business in order to improve production processes and reduce operational cost, to get to compete on a global level. That was a major restructuring by further evolution in the use of technology to support innovative operations.
Entered the technology in all areas of life and different regulations, This led to use as a change in all aspects The companies achieved success and progress today through the use of resources so as to ensure the wishes of the customers and their needs, and the requirements of the market primarily, Which is reflected on the basis of building strate
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.