conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
In this paper, we apply the notion of a bipolar fuzzy n-fold KU-ideal of KU- algebras. We introduce the concept of a bipolar fuzzy n-fold KU-ideal and investigate several properties. Also, we give relations between a bipolar fuzzy n- fold KU-ideal and n-fold KU-ideal. The image and the pre-image of bipolar fuzzy n-fold KU-ideals in KU-algebras are defined and how the image and the pre- image of bipolar fuzzy n-fold KU-ideals in KU-algebras become bipolar fuzzy n- fold KU-ideals are studied. Moreover, the product of bipolar fuzzy n-fold KU- ideals in Cartesian product KU-algebras is given.
Some Results on Fuzzy Zariski
Topology on Spec(J.L)
This paper introduces the concept of fuzzy σ-ring as a generalization of fuzzy σ-algebra and basic properties; examples of this concept have been given. As the first result, it has been proved that every σ-algebra over a fuzzy set x* is a fuzzy σ-ring-over a fuzzy set x* and construct their converse by example. Furthermore, the fuzzy ring concept has been studied to generalize fuzzy algebra and its relation. Investigating that the concept of fuzzy σ-Ring is a stronger form of a fuzzy ring that is every fuzzy σ-Ring over a fuzzy set x* is a fuzzy ring over a fuzzy set x* and construct their converse by example. In addition, the idea of the smallest, as an important property in the study of real analysis, is studied
... Show MoreThere is no doubt that the achievement of the manuscripts is important in a place as it is based on reviving the heritage of the Islamic nation, as well as engaging in the prophetic hadith and its sciences pride for every Muslim, and this prompted me to achieve a manuscript message that serves this aspect i.e. the science of the prophetic hadith, and in an important subject that needs to stand on Each of the people, as well as the one who cares about the science of hadith and this topic is: Explaining the hadith of the people is partners in three, to the scholar Muhammad bin Ismail, famous for the Prince Al-Sanani, mentioning his methods and evidence, and their degree of health and weakness, and the statement of what is intended of him,
... Show MoreThe lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreMost heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show More