conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
In the modern world, wind turbine (WT) has become the largest source of renewable energy. The horizontal-axis wind turbine (HAWT) has higher efficiency than the vertical-axis wind turbine (VAWT). The blade pitch angle (BPA) of WT is controlled to increase output power generation over the rated wind speed. This paper proposes an accurate controller for BPA in a 500-kw HAWT. Three types of controllers have been applied and compared to find the best controller: PID controller (PIDC), fuzzy logic type-2 controller (T2FLC), and hybrid type-2 fuzzy-PID controller (T2FPIDC). This paper has been used Mamdani and Sugeno fuzzy inference systems (FIS) to find the best inference system for WT controllers. Furthermore, genetic algorithm (GA) and particl
... Show MoreThe article discusses the spatial analysis of the chemical soil properties that is a key component of the agriculture ecosystem based on satellite images. The main objective of the present study is to measure the chemical soil properties (total dissolved salts (TDS), Electrical conductivity (EC), PH, and) and the spatial variability. On 13 November 2020 (wet season), a total of 12 soil samples were collected in the field through random sampling in the Sanam mountain-Al Zubair region south of Basra province, to contain its soil samples components of minerals and precious elements such as silica and sulfur. From experimental results, the soil sample in the sixth position has the highest concentration of TDS values, reached (5798.4
... Show MoreThe aim of this study was spot light to the possibility of confection between hepatitis C&G viruses in Iraqi patients. The groups was studied included two groups as follow: 1- first group: its (Infected group) the patients of this group have Anti-HCV abs in their serum by using Indirect ELISA technique. 2- second group: its (Control group) the persons of this group have no Anti-HCV abs in their serum by using indirect ELISA technique. The result of this study was observed there was two patients from the first group have Anti-HGVabs in their serum with infection percent 2.70%, also the same result was found in the second group wich mean there was two persons have Anti-HGVabs in their serum with infection percent 8.33% .So when we comparin
... Show MoreBackground: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),
... Show MoreThis study is the first investigation in Iraq dealing with genotyping of
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.