A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments
In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show MoreThe rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreBackground: The aim of this in vitro study was to evaluate and compare the microleakage between Vertise Flow T M composite material and other conventional (Filtek Z250, riva light cure and SDR) composite materials when restoring CII mesial box only cavity at gingival margin through die penetration test Materials and methods: Forty maxillary first premolars were prepared with class II box design only cavities. Samples were divided into four groups of ten teeth according to material used: group I (FiltekZ250 only). Group II (SDR+FiltekZ250). Group III (Vertise Flow +FiltekZ250). Group IV (Riva light cure+ FiltekZ250). After 24 hrs. immersion in 2% in methylene blue, samples were sectioned and micro leakage was estimated. Results: None of the
... Show MoreBackground: This study compared in vitro the marginal adaptation of three different, low shrink, direct posterior composites Filtekâ„¢ P60 (packable composite), Filtekâ„¢ P90 (Silorane-based composite) and Sonic fillâ„¢ (nanohybrid composite) at three different composite/enamel interface regions (occlusal, proximal and gingival regions) of a standardized Class II MO cavity after thermal changes and mechanical load cycling by scanning electron microscopy. Materials and methods:Thirty six sound human maxillary first premolars of approximately comparable sizes were divided into three main groups of (12 teeth) in each according to the type of restorative material that was used: group (A) the teeth were restored with Filtekâ„¢ P6
... Show MoreBackground: Dental caries is one of the most significant problems in world health care. Restoring carious primary teeth is one of the major treatment goals for Children, and the light activated resin restoration materials like composite, resin-modified glass ionomer and polyacid-modified which was introduced in dentistry in 1970, widely used in clinical dentistry but its application increased dramatically in recent years because of its biocompatibility, color matching, good adhesive properties of its resemblance in physical and mechanical aspects to tooth. The aim of this study: To evaluate the microleakage of Polyacid-Modified Composite resin Compared to Flowable Hybrid Composite and Resin-Modified Glass ionomer cement. Materials and me
... Show MoreBackground: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show More