Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.
Recently, numerous the generalizations of Hurwitz-Lerch zeta functions are investigated and introduced. In this paper, by using the extended generalized Hurwitz-Lerch zeta function, a new Salagean’s differential operator is studied. Based on this new operator, a new geometric class and yielded coefficient bounds, growth and distortion result, radii of convexity, star-likeness, close-to-convexity, as well as extreme points are discussed.
In this work, polynomials and the finite q-exponential operator are constructed. The operator is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension, Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials are deduced by giving special values to polynomials .
Identification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed to d
... Show MoreIn this paper, by using the Banach fixed point theorem, we prove the existence and uniqueness theorem of a fractional Volterra integral equation in the space of Lebesgue integrable ð¿1(ð‘…+) on unbounded interval [0,∞).
Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show Morethe researchers pointed that the poet relied on several means in the form of poetic images, including analogy, and the metaphor with its various elements, The chromatic component has also been used in the formation of its poetic image,and resorted to the correspondence of the senses and the symbol of two types:Self-code, public code : And we find a variety of symbolic stems from different sources, from these symbols, what is religious, including what is historical and what is legendary, and such symbols, which resorted to the rare places of his poems confined to the myths contained in the Bible, His use of the general symbols was ineffective in the poetic picture, relying on the metaphor and metaphor.
The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show MoreThe detection and estimation of weathering conditions have become a very important daily necessity in our life. For this purpose, several satellites of low resolution imagery were launched by the weathering and environmental agencies. The important weather paremeters are temperuter, wind direction, velocity, clould and humidity, etc. The low resolution images often deal with large-scale phenomena and the interpretation and projection of the produced data requires continuous development of tools and criteria. In this paper, the low spatial resolution data generated by the moderate resolution imaging spectroradiometer (MODIS) were used to monitor the cloud density and direction above Iraq and i
... Show MoreThe conjugate coefficient optimal is the very establishment of a variety of conjugate gradient methods. This paper proposes a new class coefficient of conjugate gradient (CG) methods for impulse noise removal, which is based on the quadratic model. Our proposed method ensures descent independent of the accuracy of the line search and it is globally convergent under some conditions, Numerical experiments are also presented for the impulse noise removal in images.
It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show More