Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
range by using mean filter for smoothing before applying Laplace operator.
Moreover, thresholding is used for image in both cases to see results in clearer
manner.
The concept of transitional justice is newly emerging, as it was mainly associated with addressing issues of serious breaches and abuses of human rights during conflicts and situations resulting from violence and the use of force in societies that are in the process of democratization, as transitional justice aims primarily to restore civil peace and rebuild institutions The state needs multidimensional justice: a judicial system that achieves the rule of law, corrective restoration of the wounds of the past, and a distributive characteristic of the redistribution of wealth.
يمثل الأخذ بالنظام الفيدرالي أطاراً تنظيمياً لشكل الدولة و مرحلة تحول مهمة في بنية الدولة العامة في مختلف مجالاتها، فالانتقال من المركزية في أدارة الشؤون العامة للدولة الى النمط الفيدرالي يمثل تحولا بنيوياً وسيكولوجياً ،حيث يكون هنالك توزيع مكاني - عمودي للسلطة والثروة بين الوحدات المكونة للدولة بشكل يختلف كليا عن الحالة المركزية، ونجد صور تنظيمية عديدة تتأسس ضمن اطار الفيدرالية العام ،
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show Morenatural and non-natural disasters, is an environmental challenges the society and the economy as well as a direct and indirect economic affect, and the units are part of the system overlapping among themselves and thus affected by external indicators, directly or indirectly, these direct effects appear in the destruction or damage inflicted by disasters in property , infrastructure , superstructure , accounting information systems and indirectly in the outcome of future business, comes research problem through access to accounting treatments issued by the Federal Office of financial supervision to address the damage caused by the disasters and prepare the missing financial accounts it turns out us that there is negligence of a nu
... Show MoreIn this paper , some of lexical stylistic , syntactical stylistic devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences. This paper aims at identifying the functions and the frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreProviding useful information in estimating the amount and timing and the degree of uncertainty concerning the future cash flows is one of the three main objectives of the financial reporting system, which is done through the main financial statements. The interest on standard-setting bodies in the forecasting of future cash flows, especially Financial Accounting Standards Board (FASB) explain under Accounting Standard (1) of the year 1978 "Objectives of Financial Reporting by Business Enterprises", paragraph (37) thereof that accounting profits better than cash flows when forecasting future cash flows, In contrast, IAS (7) as amended in 1992 aims to compel economic units to prepare statement of c
... Show MoreBackground : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e
... Show More