A quantitative description of microstructure governs the characteristics of the material. Various heat and excellent treatments reveal micro-structures when the material is prepared. Depending on the microstructure, mechanical properties like hardness, ductility, strength, toughness, corrosion resistance, etc., also vary. Microstructures are characterized by morphological features like volume fraction of different phases, particle size, etc. Relative volume fractions of the phases must be known to correlate with the mechanical properties. In this work, using image processing techniques, an automated scheme was presented to calculate relative volume fractions of the phases, namely Ferrite, Martensite, and Bainite, present in the microscopic image of high strength low alloy steel. First, the microscopic image was segmented into Ferrite, Martensite, and Bainite regions. The phase structure's geometric property was used to identify different phases present inside the micrograph. After phase detection, the volume fraction of each region is calculated.
Feature selection, a method of dimensionality reduction, is nothing but collecting a range of appropriate feature subsets from the total number of features. In this paper, a point by point explanation review about the feature selection in this segment preferred affairs and its appraisal techniques are discussed. I will initiate my conversation with a straightforward approach so that we consider taking care of features and preferred issues depending upon meta-heuristic strategy. These techniques help in obtaining the best highlight subsets. Thereafter, this paper discusses some system models that drive naturally from the environment are discussed and calculations are performed so that we can take care of the prefe
... Show MoreOver the last period, social media achieved a widespread use worldwide where the statistics indicate that more than three billion people are on social media, leading to large quantities of data online. To analyze these large quantities of data, a special classification method known as sentiment analysis, is used. This paper presents a new sentiment analysis system based on machine learning techniques, which aims to create a process to extract the polarity from social media texts. By using machine learning techniques, sentiment analysis achieved a great success around the world. This paper investigates this topic and proposes a sentiment analysis system built on Bayesian Rough Decision Tree (BRDT) algorithm. The experimental results show
... Show MoreThe idea of carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed
... Show MoreThe main aim of image compression is to reduce the its size to be able for transforming and storage, therefore many methods appeared to compress the image, one of these methods is "Multilayer Perceptron ". Multilayer Perceptron (MLP) method which is artificial neural network based on the Back-Propagation algorithm for compressing the image. In case this algorithm depends upon the number of neurons in the hidden layer only the above mentioned will not be quite enough to reach the desired results, then we have to take into consideration the standards which the compression process depend on to get the best results. We have trained a group of TIFF images with the size of (256*256) in our research, compressed them by using MLP for each
... Show MoreUncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image
... Show MoreIodine-131 has become an essential radionuclide used in nuclear medicine for clinical and research purposes. The increase use of this radionuclide in medicine for diagnostic and treatment of thyroid diseases creates a demand to obtain a feasible methodology for occupational or accidental monitoring of internal contamination. In this study, two techniques were employed to find an appropriate one of in vivo bioassay for evaluating Iodine-131 body content. A scanning Whole Body Counter (WBC) equipped with 6NaI (Tl) scintillation detector, an anthropomorphic phantom and point source were used. The results showed that the counter sensitivity, as a first approach (conventional method), had a logarithmic and significant correlation w
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More