Diabetic retinopathy is an eye disease, because of pressure in eye nerve fiber. It is a major cause of blindness in middle as well as older age groups; therefore it is essential to diagnose it earlier. Some of the challenges are in the diagnosis of the disease is detection edges of the image, may be some important edges are missed outcome the noise around the corners.
Wherefore, in order to reduce these effects in this paper, we proposed a new technique for edge detection using traditional operators in combination with fuzzy logic based on fuzzy inference system. The results show that the proposed fuzzy edge detection technique better than of traditional techniques, where vascular are markedly detected over the original.
In this paper we present a new method for solving fully fuzzy multi-objective linear programming problems and find the fuzzy optimal solution of it. Numerical examples are provided to illustrate the method.
In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show MoreBackground: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreCyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreLeishmaniasis is a widespread parasitic disease that occurs as a result of infection with a unicellular parasite belonging to the genus Leishmania. Diagnosis by conventional methods is inaccurate and is not sensitive to confirm the genus infection. Here, we have investigated a methods for Leishmania genus diagnosis, which includes the technique of polymerase chain reaction to detect the presence of the parasite at in vitro for promastigote cultures using three genus-specific primer pairs to amplify HSP70, ITS, and ITS2. The results showed single band of ~1422, ~1020, and ~550 respectively. This study has proved the ability of these primer pairs to detect Leishmania infection and recommend them to be used for detection of leishmaniasis in
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The theories of metric spaces and fuzzy metric spaces are crucial topics in mathematics.
Compactness is one of the most important and fundamental properties that have been widely used in Functional Analysis. In this paper, the definition of compact fuzzy soft metric space is introduced and some of its important theorems are investigated. Also, sequentially compact fuzzy soft metric space and locally compact fuzzy soft metric space are defined and the relationships between them are studied. Moreover, the relationships between each of the previous two concepts and several other known concepts are investigated separately. Besides, the compact fuzzy soft continuous functions are studie
... Show More