The brain's magnetic resonance imaging (MRI) is tasked with finding the pixels or voxels that establish where the brain is in a medical image The Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents. Next, the lines are separated into characters. In the Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents case of fonts with a fixed MRI width, the gaps are analyzed and split. Otherwise, a limited region above the baseline is analyzed, separated, and classified. The words with the lowest recognition score are split into further characters x until the result improves. If this does not improve the recognition score, contours are merged and classified again to check the change in the recognition score. The features for classification are extracted from small fixed-size patches over neighboring contours and matched against the trained deep learning representations this approach enables Tesseract to easily handle MRI sample results broken into multiple parts, which is impossible if each contour is processed separately Hard to read! Try to split sentences. The CNN inception network seem to be a suitable choice for the evaluation of the synthetic MRI samples with 3000 features, and 12000 samples of images as data augmentation capacities favors data which is similar to the original training set and thus unlikely to contain new information content with an accuracy of 98.68%. The error is only 1.32% with the increasing the number of training samples, but the most significant impact in reducing the error can be made by increasing the number of samples.
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreIn this theoretical paper and depending on the optimization synthesis method for electron magnetic lenses a theoretical computational investigation was carried out to calculate the Resolving Power for the symmetrical double pole piece magnetic lenses, under the absence of magnetic saturation, operated by the mode of telescopic operation by using symmetrical magnetic field for some analytical functions well-known in electron optics such as Glaser’s Bell-shaped model, Grivet-Lenz model, Gaussian field model and Hyperbolic tangent field model. This work can be extended further by using the same or other models for asymmetrical or symmetrical axial magnetic field
... Show MoreImitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreBackground: Frovatriptan succinate (FVT) is an effective medication used to treat migraines; however, available oral formulations suffer from low permeability; accordingly, several formulations of FVT were prepared. Objective: Prepare, optimize, and evaluate FVT-BE formulation to develop enhanced intranasal binary nano-ethosome gel. Methods: Binary ethosomes were prepared using different concentrations of phospholipid PLH90, ethanol, propylene glycol, and cholesterol by thin film hydration and characterized by particle size, zeta potential, and entrapment efficiency. Furthermore, in-vitro, in-vivo, ex-vivo, pharmacokinetics, and histopathological studies were done. Results: Regarding FVT-loaded BE, formula (F9) demonstrated the best paramet
... Show MoreMagnetic nanoparticles (MNPs) of iron oxide (Fe3O4) represent the most promising materials in many applications. MNPs have been synthesized by co-precipitation of ferric and ferrous ions in alkaline solution. Two methods of synthesis were conducted with different parameters, such as temperature (25 and 80 ̊C), adding a base to the reactants and the opposite process, and using nitrogen as an inert gas. The product of the first method (MNPs-1) and the second method (MNPs-2) were characterized by x-ray diffractometer (XRD), Zeta Potential, atomic force microscope (AFM) and scanning electron microscope (SEM). AFM results showed convergent particle size of (MNPs-1) and (MNPs-2) with (86.01) and (74.14)
... Show MoreThis study was carried out to study effect of magnetic water ( M0 and M) and different concentrations of coconut extract in Fragaria x ananassa (Duch) C.V Festival. The results showed significant differences in the plants treated with magnetic water ( 0.12 Tesla) and different concentrations of coconut extract C1 (0%), C2 (2.5%), C3 (5%), C4 (7.5%) and C5 (10%) in vegetative parameters as in leaf area and chlorophyll in treatment M0C3 was (53.72 Dcm2, 50.00), respectively, highest leaf number and plant dry weight in MC4 (12.77,14.22 gm), respectively. Results recorded significant differences in fruit parameters such as weight in MC1 (18.97 gm). The maximum fruit number was in MC3 (110), the greatest fruit size was in MC4 (15.78 cm3) and the
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show More