Biological image edge detection preserving the important structural properties in an image. Detecting accurate edges are very important for analyzing the basic properties associated with a biological image. Gradient operator plays very important role in edge detection. In this paper the images had been using are color biological images taken from microbiology laboratory at the biological department college of science Al-MustansiriyhUniversity and the effect of gradient operation have applied on around 10 different biological color images but view only two. In our proposed approach comparative of various gradient of biological image include (gradient of image, gradient of image using first order derivative edge detection (Soble,Prewitt,Roberts)and gradient image using morphological operation and The comparative output images using quality assessment include (MSR, PNSR, l2rat, maxerr, entropy). The software tool that has been used is MATLAB 7.0 from the results we found that morphological and Robert gradient edge detection algorithm better performs than the others and are important with extraction features of biologic images.
The last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.
Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from
... Show MoreImage texture is an important part of many types of images, for example medical images. Texture Analysis is the technique that uses measurable features to categorize complex textures. The main goal is to extract discriminative features that are used in different pattern recognition applications and texture categorization. This paper investigates the extraction of most discriminative features for different texture images from the “Colored Brodatz” dataset using two types of image contrast measures, as well as using the statistical moments on five bands (red, green, blue, grey, and black). The Euclidean distance measure is used in the matching step to check the similarity degree. The proposed method was tested on 112 classes o
... Show MoreIn this paper, the complexes of Shiff base of Methyl -6-[2-(diphenylmethylene)amino)-2-(4-hydroxyphenyl)acetamido]-2,2-dimethyl-5-oxo-1-thia-4-azabicyclo[3.2.0]heptane-3-carboxylate (L) with Cobalt(II), Nickel(II), Cupper(II) and Zinc(II) have been prepared. The compounds have been characterized by different means such as FT-IR, UV-Vis, magnetic moment, elemental microanalyses (C.H.N), atomic absorption, and molar conductance. It is obvious when looking at the spectral study that the overall complexes obtained as monomeric structure as well as the metals center moieties are two-coordinated with octahedral geometry excepting Co complexes that existed as a tetrahedral geometry. Hyper Chem-8.0.7
... Show MoreHueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show MoreIn this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show More