The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Image classification can be defined as one of the most important tasks in the area of machine learning. Recently, deep neural networks, especially deep convolution networks, have participated greatly in end-to-end learning which reduce need for human designed features in the image recognition like Convolution Neural Network. It is offers the computation models which are made up of several processing layers for learning data representations with several abstraction levels. In this work, a pre-trained deep CNN is utilized according to some parameters like filter size, no of convolution, pooling, fully connected and type of activation function which includes 300 images for training and predict 100 image gender using probability measures. Re
... Show MoreIn this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of societie
... Show MoreEpilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-
... Show MoreA direct solvent extraction was used for the determination of phenolic compounds from Teucrium polium . Methanol, ethanol, iso-propanol, butanol and D.W were used as an extractants and study the affecting extraction factors including : the type and solvent concentration, temperature, extraction time and number of batch extraction, by using Folin-ciocalteu method to determine the Total Phenolic Content (TPC) and measurement of the absorbance at λmax 765nm. The accuracy and precision of this method were determined by preparing laboratory samples of Gallic acid , the results showed relative errors ranging from ±0.5 – 1.49 % and the standard deviation equal to 1.2
... Show MoreReuse of spent hydrodesulphurization (HDS) of middle petroleum fractions catalyst CoMo/γAl2O3 was accomplished via removal of coke and contaminants such as vanadium, Iron, Nickel, and sulfur. Three processes were adopted; extraction, leaching, decoking. Soluble and insoluble coke was removed. Leaching step used three different solvents (oxalic acid, ammonium peroxydisulfate and oxalic acid + H2O2) in separate in order to remove contaminant metals (V, S, Ni and Fe).
The effect of soluble coke removal on leaching step was studied. It was found that the removal of soluble coke significantly enhances the leaching of contaminants and barely affected the removal of active metals
... Show MorePurpose To extract the lower anterior teeth, the oral surgeon needs to anesthetize the pulpal tissue of the accused tooth and the surrounding tissues. The lingual nerve innervates the lingual soft tissue to the lower teeth, this nerve usually anesthetized alongside the inferior alveolar nerve by a block technique. However, the lingual tissue of the lower anterior teeth usually anesthetized by either infiltration or periodontal ligament injection (PDL) techniques. This study was intended to compare between these two techniques. Methods Forty-eight teeth were extracted from 24 patients. Non-adjacent two lower anterior teeth in the same patient were selected. The lingual soft tissue in one of them was anesthetized by PDL injection technique wh
... Show MoreThe palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.
In this paper, the proposes secure system to improving security of ID card and passports is by generating cubic spline co-occurrence code (CCO code) for each ID card. The authentication part, begins passing ID card through the checkpoint then the checkpoint will check the information of card or passport by also extracting features in order to generate the cubic spline co-occurrence code (CCO code), finally comparison is made between extracted CCO code at the checkpoint and CCO code that has been printed on ID card or passport (type of fraud like change personal picture or fraud it’s information). Several tests were conducted to evaluate the performance of the proposed security system. Furthermore, the experiment results reveal that the
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show More