The computer vision branch of the artificial intelligence field is concerned with
developing algorithms for analyzing image content. Data may be compressed by
reducing the redundancy in the original data, but this makes the data have more
errors. In this paper image compression based on a new method that has been
created for image compression which is called Five Modulus Method (FMM). The
new method consists of converting each pixel value in an (4x4, 8×8,16x16) block
into a multiple of 5 for each of the R, G and B arrays. After that, the new values
could be divided by 5 to get new values which are 6-bit length for each pixel and it
is less in storage space than the original value which is 8-bits.
The aim of this paper is to obtain a set of traveling wave solutions for klein –Gorden equation with kerr law non-linearity. More precisely, we apply a new path of popularized homogeneous balance (HB) method in terms of using linear auxiliary equations to find the results of non-linear klein-Gorden equation, which is a fundamental approach to determine competent solutions. The solutions are achieved as the integration of exponential, hyperbolic, trigonometric and rational functions. Besides, some of the solutions are demonstrated by the3D graphics.
Ebastine (EBS) is a poorly water-soluble antihistaminic drug; it belongs to the class II group according to the biopharmaceutical classification system (BCS). The aim of the present work was to enhance the solubility, dissolution rate and micromeritic properties of the drug, by formulating it as spherical crystal agglomerates by Quasi Emulsion Solvent Diffusion (QESD) method.
Spherical crystal agglomerates (SCAs) were prepared in presence of three solvents dichloromethane (DCM), water and chloroform as a good solvent, poor solvent and bridging solvent respectively. Agglomeration of EBS involved the use of some hydrophilic polymers like polyethylene glycol 4000 (PEG 4000), polyvinyl pyrrolidine K30 (PVP K30), D-?-tocopheryl
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
The aim of the current paper is to resolve the non-uniqueness in gravity interpretation through searching for singular points in the gravity field that are coincide with causative body vertices. The Absolute Second Horizontal Gradient (ASHG) method is used to locate the horizontal reference location of the body, while its amplitude could be used to define body corner depth. Intelligent use of the ASHG method could help in differentiating between basin and intrusion structures from their gravity effect and could facilitate the interpretation in forward modeling and constrain inversion modeling to maximum limit. The method is tested by using many synthetic examples with different types of shapes. A real data is used to examine the method a
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show More