conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
The primary aim of this research was to study visual spatial attention and its impact on the accuracy of the diagonal spike in volleyball. A total of 20 volleyball players of Baghdad participated in this study. The sample was homogeneous in terms of height, weight and age of the players. The tests used in the present study were: 1) Visual Spatial Attention Test. 2) Volleyball Spike Test. Based on the findings of the study, the researcher concluded that visual spatial attention has a significant impact on the accuracy of the diagonal spike in volleyball.
Spatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- south
... Show MoreThe major climate changes that have affected the planet in addition to wave the big drought plaguing the study area, including the lack of water for imports Badra River fatigue because of the Iran constructing dams on this river and make use of the waters for the benefitof its territory. The subject of finding sources of water has become available with the possibility of exploiting them in an exemplary manner is one of the key things in order to be exploited somewhere.
The study area was chosen within the eastern border of the province of Wasit within the district of Badra border, an area of (1557.5 km2) almost "to study the characteristics of hydrological and identify possibilities for water harvesting them. In this study was conduct
Paul Auster's City of Glass is here singled out as representative of the writer's The New
York Trilogy. All throughout his novelistic career, Auster has been working on a pseudothesis
that adheres to a certain aesthetic of disappearance. The study engages this Austerian
aesthetic apropos of certain theoretical stretches such as the Emersonian "Not Me", the
Thoreauvian "interval" or "nowhere", the Deleuzian "nomadic trajectory", the Derridian
"grammè" or "specter", and the Baudrillardian "disappearance". The city of the novel's titling
is here seen as the trope of all that which has already disappeared, and hence it is seen as the
space (mise en scène) where the perfect crime of the murder of the real is to be thoro
سلمان، ندى نجيب. 2015. التباين المكاني السكان الأميين في الوطن العربي للمدة 1990-2009. مجلة آداب ذي قار،مج. 4، ع. 15، ص ص. 101-126.
The study of services in villages is one of the imperative matters that must be focused on, because it leads to increased attention, which reduces the differences between the countryside and the urban. The extent of its.
It is well known that community services need to be reached by a person, unlike the anchor services that reach people, here the population distribution plays an important and prominent role in signing these services, so the dispersed distribution pattern and the gathering pattern appeared in the distribution, thus an effect on the time and distance that the person walked to obtain The services are community-based. Therefore
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreSolid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More