A nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.
The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha
... Show MoreThe detection for Single Escherichia Coli Bacteria has attracted great interest and in biology and physics applications. A nanostructured porous silicon (PS) is designed for rapid capture and detection of Escherichia coli bacteria inside the micropore. PS has attracted more attention due to its unique properties. Several works are concerning the properties of nanostructured porous silicon. In this study PS is fabricated by an electrochemical anodization process. The surface morphology of PS films has been studied by scanning electron microscope (SEM) and atomic force microscope (AFM). The structure of porous silicon was studied by energy-dispersive X-ray spectroscopy (EDX). Details of experimental methods and results are given and discussed
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
The simulation study has been conducted for the harmonics of Nd: YAG laser, namely the second harmonic generation SHG, the third harmonic generation THG, and the fourth harmonic generation FHG. Determination of beam expander's expansion ratio for specific wavelength and given detection range is the key in beam expander design for determining minimum laser spot size at the target. Knowing optimum expansion ratio decreases receiving unit dimensions and increases its performance efficiency. Simulation of the above mentioned parameters is conducted for the two types of refractive beam expander, Keplerian and Galilean. Ideal refractive indices for the lenses are chosen adequately for Nd: YAG laser harmonics wavelengths, so that increasing transm
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show More