A new features extraction approach is presented based on mathematical form the modify soil ratio (MSR) and skewness for numerous environmental studies. This approach is involved the investigate on the separation of features using frequency band combination by ratio to estimate the quantity of these features, and it is exhibited a particular aspect to determine the shape of features according to the position of brightness values in a digital scenes, especially when the utilizing the skewness. In this research, the marginal probability density function G(MSR) derivation for the MSR index is corrected, that mentioned in several sources including the source (Aim et al.). This index can be used on original input features space for three different scenes, and then implemented the marginal probability density function of MSR values to stretch the histograms of MSR images without any processing. Skewness is proposed on MSR images and combined with multispectral bands of original scene for land cover classification. This is a new method for extensively observing the types of features and its changes. The Hyperion data were utilized in this work; because they contain abundant details information for distinguish the different types of features.
In this paper a method to determine whether an image is forged (spliced) or not is presented. The proposed method is based on a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe
... Show MoreThis work investigates generating of pure phase Faujasite-type zeolite Y at the ranges chosen for this study via a static aging step in the absence of seeds synthesis. Nano-sized crystals may result when LUDOX AS-40 is used as a silica source for gel composition of range 6 and the crystallization step may be conducted for a period of 4 to 19 hr at 100 ⁰C. Moreover, large-crystals with high crystallinity pure phase Y zeolite can be obtained at hereinabove conditions but when hydrous sodium metasilicate is used as a silica source. The other selected ranges also offer pure phase Y zeolite at the same controlled conditions.
This work investigates generating of pure phase Faujasite-type zeolite Y at the ranges chosen for this study via a static aging step in the absence of seeds synthesis. Nano-sized crystals may result when LUDOX AS-40 is used as a silica source for gel composition of range 6 and the crystallization step may be conducted for a period of 4 to 19 hr at 100 ⁰C. Moreover, large-crystals with high crystallinity pure phase Y zeolite can be obtained at hereinabove conditions but when hydrous sodium metasilicate is used as a silica source. The other selected ranges also offer pure phase Y zeolite at the same controlled conditions.
The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreThis abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreBackground:Â Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.
Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi
... Show MoreAim: This study aimed to compare different types of ligation methods to obtain maximum tooth movement with the least undesirable rotation. Methods: Titanium brackets bonded to acrylic canine teeth were ligated to straight stainless steel (SS) archwires using four ligation methods (figure-O and figure-8 elastics, SS ligatures, and Leone Slide ligatures). The teeth with the ligatures in place were stored in a water bath at 37ºC for 1 day, 1 week, 2, 4 or 6 weeks before testing. The teeth were retracted through softened wax along the archwire and the amount of tooth movement and degree of rotation were measured. Results: Slide ligatures showed the highest distance of tooth movement and degree of canine rotation followed by figure-O elastics
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More