The diseases presence in various species of fruits are the crucial parameter of economic composition and degradation of the cultivation industry around the world. The proposed pear fruit disease identification neural network (PFDINN) frame-work to identify three types of pear diseases was presented in this work. The major phases of the presented frame-work were as the following: (1) the infected area in the pear fruit was detected by using the algorithm of K-means clustering. (2) hybrid statistical features were computed over the segmented pear image and combined to form one descriptor. (3) Feed forward neural network (FFNN), which depends on three learning algorithms of back propagation (BP) training, namely Scaled conjugate gradient (SCG-BP), Resilient (R-BP) and Bayesian regularization (BR-BP), was used in the identification process. Pear fruit was taken as the experiment case during this work with three classifications of diseases, namely fire blight, pear scab, and sooty blotch, as compared to healthy pears. PFDINN framework was trained and tested using 2D pear fruit images collected from the Fruit Crops Diseases Database (FCDD). The presented framework achieved 94.6%, 97.3%, and 96.3% efficiency for SCG-BP, R-BP, and BR-BP, respectively. An accuracy value of 100% was achieved when the R-BP learning algorithm was trained for identification.
Multiple linear regressions are concerned with studying and analyzing the relationship between the dependent variable and a set of explanatory variables. From this relationship the values of variables are predicted. In this paper the multiple linear regression model and three covariates were studied in the presence of the problem of auto-correlation of errors when the random error distributed the distribution of exponential. Three methods were compared (general least squares, M robust, and Laplace robust method). We have employed the simulation studies and calculated the statistical standard mean squares error with sample sizes (15, 30, 60, 100). Further we applied the best method on the real experiment data representing the varieties of
... Show MoreDesert truffle is considered as a type of Syrian wild fungi that spreads heavily, and it occupies important rank in folk medicine, where its aqueous extract is used for the treatment of some eye and skin illnesses, and people prefer the use of black truffle. This work interested in studying of the most available species; Terfezia claveryi (black) and Tirmania pinoyi (white). The extracts of the two species of truffle were prepared by maceration with water, methanol, and ethanol 70%. Their total phenolic contents (TPC) and total flavonoid contents (TFC) were analyzed using Folin-ciocalteu and Aluminum chloride methods respectively, and their antioxidant activities was tested using 2,2-diphenyl-1-picrylhydrazyl (DPPH) and
... Show MoreThe aims of this paper is investigating the spread of AIDS both within-host, through the contact between healthy cells with free virus inside the body, and between-host, through sexual contact among individuals and external sources of infectious. The outbreak of AIDS is described by a mathematical model consisting of two stages. The first stage describes the within-host spread of AIDS and is represented by the first three equations. While the second stage describes the between-host spread of AIDS and represented by the last four equations. The existence, uniqueness and boundedness of the solution of the model are discussed and all possible equilibrium points are determined. The local asymptotic stability (LAS) of the model is studied, wh
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreA particular solution of the two and three dimensional unsteady state thermal or mass diffusion equation is obtained by introducing a combination of variables of the form,
η = (x+y) / √ct , and η = (x+y+z) / √ct, for two and three dimensional equations
respectively. And the corresponding solutions are,
θ (t,x,y) = θ0 erfc (x+y)/√8ct and θ( t,x,y,z) =θ0 erfc (x+y+z/√12ct)
This paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela
... Show MoreThe study showed flow rates and the interaction between the settlements served by applying the model of gravity theory to measure depending on the number of the population between city Najaf and the rest of the other settlements served and using three functions of disability, time and cost, as recorded an increase in the interaction index with some settlements like them Kufa, Abbasid and Manathira, while the indicator contrast was in other settlements, either when the application of the gravity model depending on trips and socio-economic characteristics accuracy rate was more pronounced.