NGC 6946 have been observed with BVRI filters, on October 15-18,
2012, with the Newtonian focus of the 1.88m telescope, Kottamia
observatory, of the National Research Institute of Astronomy and
Geophysics, Egypt (NRIAG), then we combine the BVRI filters to
obtain an astronomical image to the spiral galaxy NGC 6946 which
is regarded main source of information to discover the components of
this galaxy, where galaxies are considered the essential element of
the universe. To know the components of NGC 6946, we studied it
with the Variable Precision Rough Sets technique to determine the
contribution of the Bulge, disk, and arms of NGC 6946 according to
different color in the image. From image we can determined the
contribution for each component and its percentage, then what is the
percentage mean. In this technique a good classified image result
and faster time required to done the classification process.
The map of permeability distribution in the reservoirs is considered one of the most essential steps of the geologic model building due to its governing the fluid flow through the reservoir which makes it the most influential parameter on the history matching than other parameters. For that, it is the most petrophysical properties that are tuned during the history matching. Unfortunately, the prediction of the relationship between static petrophysics (porosity) and dynamic petrophysics (permeability) from conventional wells logs has a sophisticated problem to solve by conventional statistical methods for heterogeneous formations. For that, this paper examines the ability and performance of the artificial intelligence method in perme
... Show MoreTourism is a human phenomenon and economic and social activity. It represents an effective forces in the life of the individuals and state alike. As any other economic and human activity has appositive and negative results.
So there is a necessary to planning and activate this sector to get the most possible advantage.
Tourism has special importance out of its effect on the structure and performance of national economy. It can be regarded a dynamic activity with mutual effect include all the economic activities within and out the state. Tourism is affected and affect the production con summing , joineries , communication , ports ,hotel , restaurants ,internal and
... Show MoreThe aim of this research is to identify the effect of Webinar technique on digital culture in the College of Education for pure sciences at Ibin Haitham, University of Baghdad. The research samples consisted of (68) male and female students from the Chemistry Department who are following classes during the (2019- 2020) academic year. The samples represent (42%) of the total number of (162) students split into control and experimental groups. For this purpose, the scientific contents for testing were determined. The experimental part is based on analysis of the results from experiments in (preliminary standard solutions, refractive index, Beer-Lambert law). To achieve the aim of the research in testing the measure of student's digital cultur
... Show MoreIn this research, an analysis for the standard Hueckel edge detection algorithm behaviour by using three dimensional representations for the edge goodness criterion is presents after applying it on a real high texture satellite image, where the edge goodness criterion is analysis statistically. The Hueckel edge detection algorithm showed a forward exponential relationship between the execution time with the used disk radius. Hueckel restrictions that mentioned in his papers are adopted in this research. A discussion for the resultant edge shape and malformation is presented, since this is the first practical study of applying Hueckel edge detection algorithm on a real high texture image containing ramp edges (satellite image).
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.
Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,
... Show MoreThe revolution of technology in the 21st century has changed radically the
climate of opinion concerning second language education. In order to excel in
today’s world, teachers and learners need to adopt new roles and be equipped with
new skills and competencies that go beyond the basic ones of listening, speaking,
reading, and writing; skills that cannot be gained if teachers teach mere academic
subjects, and students are evaluated on how well they have learnt the minute sub
skills in those content areas.
This session will touch upon several skills which may be considered the
new basics of the 21st century. Among these skills are: autonomy, active learning,
critical thinking, cooperative learning, and digita
In this paper, two different chaotic dynamic systems are coupled using a semiconductor laser to produce a new chaotic system. These two chaotic systems are Rossler and Chua systems. X-dynamic of Rossler system was coupled optically using optical fiber as a carrier of signal with x, y, and z-dynamics of Chua system. The results were analyzed and the behavior of Chua system was found to be changing in time series which, in turn, changed the attractor. The Chua attractor was converted from double scroll to single scroll. The results obtained from connecting two different systems in chaotic behavior showed a remarkable increase in the bandwidth of Chua system. This increase in bandwidth opens up a wide field for many
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis study aims to analyze the spectral properties of plasma produced from rice husk(Rh) using the laser breakdown spectroscopy (LIBS) method. The plasma generation process used the fundamental harmonic (1064 nm) of a Q-switched Nd:YAG laser. Yttrium aluminum garnet (YAG) is a man-made crystalline material. The laser fired pulses with a duration of 10 ns and a repetition rate of 6 Hz. Thus, the energy outputs achieved were 50–200 mJ at the wavelength of 1064 (nm). The silica content in the rice hulls was verified using an XRF measurement, which revealed the presence of silica in the rice hulls in a high percentage. Precise beam focusing was achieved by focusing the laser on the target material. This target material is placed with
... Show More