The Fuzzy Logic method was implemented to detect and recognize English numbers in this paper. The extracted features within this method make the detection easy and accurate. These features depend on the crossing point of two vertical lines with one horizontal line to be used from the Fuzzy logic method, as shown by the Matlab code in this study. The font types are Times New Roman, Arial, Calabria, Arabic, and Andalus with different font sizes of 10, 16, 22, 28, 36, 42, 50 and 72. These numbers are isolated automatically with the designed algorithm, for which the code is also presented. The number’s image is tested with the Fuzzy algorithm depending on six-block properties only. Groups of regions (High, Medium, and Low) for each number showed unique behavior to recognize any number. Normalized Absolute Error (NAE) equation was used to evaluate the error percentage for the suggested algorithm. The lowest error was 0.001% compared with the real number. The data were checked by the support vector machine (SVM) algorithm to confirm the quality and the efficiency of the suggested method, where the matching was found to be 100% between the data of the suggested method and SVM. The six properties offer a new method to build a rule-based feature extraction technique in different applications and detect any text recognition with a low computational cost.
The extrasolar planets in the vicinity of stars are expected to be bright enough
and are very difficult to be observed by direct detection. The problem is attributed to
the side loops of the star that created due to the telescope diffraction processing.
Several methods have been suggested in the literatures are being capable to detect
exoplanet at a separation angle of 4λ/D and at a contrast ratio of 10-10. These
methods are more than one parameter function and imposing limitations on the inner
working distance. New simple method based on a circular aperture combined with a
third power Gaussian function is suggested. The parameters of this function are then
optimized based on obtaining a minimum inner working dis
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIntroduction: Candida spp. has become increasingly resistant to antifungal drugs, with elevated MIC levels causing a negative medical impact and increasing the number of patients at risk of candidiasis. According to the CDC, about 7% of Candida blood samples show reduced susceptibility to fluconazole. Monitoring the antifungal resistance profile of Candida spp. is vital, as non-Albicans species may limit treatment options. Objective: Evaluate the antifungal effectiveness against clinical Candida spp. isolates of six antifungals: amphotericin B, fluconazole, voriconazole, itraconazole, caspofungin, and 5-fluorocytosine. Methods: 100 samples were collected from various clinical samples at the National Centre of Teaching Laboratories
... Show MoreMeasuring goat weight on a farm is carried out by two methods. The first method conventionally measures the chest girth (CG) and body length (BL), while the second is performed using a scale. This study aimed to facilitate the CG and BL measurements to estimate goat weight more efficiently through image processing. The endpoints of CG and BL were determined automatically using binary large object (BLOB) segmentation. The images of 120 goats were taken at three different shooting distances of 50 cm, 70 cm, and 90 cm. The statistical testing of the three scenarios in this study explained that the ideal distance to take pictures is the basis for determining whether or not the size of the circumference and BL is appropriate as a fea
... Show MoreThe present research studies numbers and its uses in the Islamic ornament. The study consists of four chapters; the first is dedicated to the problem of the research, the value of the study, and the aim of the study, and its limit. The problem of the study deals with the uses of numbers in Islamic ornament and how these numbers were used for aesthetic purposes. What are the analytical bases that enable us to read the geometrical compositions ornament numerically? The value of the research is the study forms an analytical and visual study of the numbers in the Islamic ornamentation. Additionally, this study is an aesthetic assessment to the philosophy of the number and its uses in Islamic architecture. The study is limited to the ornament
... Show MoreFuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking f
... Show MoreThis paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
Background: Chlamydia trachomatis is one of the most common human pathogens and considered as one of the causative agents of STDs. This organism cause acute and recurrent pelvic infections and infertility.
Patients and Methods: Two hundred and seventy three females were included in the present study, attending infertility department, AL-Elwiya hospital, AL-Jarah private hospital, central public health laboratory and STDs clinic to whom IFAT, ELAF and immunoglobulins concentration were done.
Results: Females were divided into three age groups <20; 20-39 and ≥40 years. Single and repeated abortions were 44.9%, 55.1% respectively. Primary and secondary infertility were 55.6% and 44.4%. Higher abortio
Recently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreRecent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u
... Show More