Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse noise (salt and pepper) in different power levels. The obtained results are encouraging to some extent. Also this algorithm was improved sharpen the details as well as the results were also encouraging.
Given the growing interest in digital marketing operations and the technology imposed by the reality in which both companies and their customers are affected, the researchers attempted to shed light on the reality and challenges of digital marketing from the faculty members viewpoint at Jouf university, the problem is that technology has imposed a new reality that has resulted in a major change in behavioral patterns of customers with a number of obstacles and challenges confronted customers in digital marketing, it is expected that the outcomes of this study help companies in overcoming the obstacles that prevent the desire and ability of the customer to change his behavioral style to deal with electronic shopping operations and
... Show MoreThe impact of digital transformation on the relationship between commercial bank customers’ empowerment and competitive advantage
Fusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show MoreIn the present study, Čech fuzzy soft bi-closure spaces (Čfs bi-csp’s) are defined. The basic properties of Čfs bi-csp’s are studied such as we show from each Čfs bi-csp’s (
The aim of this work is to a connection between two concepts which are an interval value fuzzy set and a hyper AT-algebra. Also, some properties of these concepts are found. The notions of IVF hyper AT-subalgebras, IVF hyper ideals and IVF hyper AT-ideals are defined. Then IVF (weak, strong) hyper ideals and IVF (weak, strong) hyper AT-ideals are discussed. After that, some relations among these ideals are presented and some interesting theorems are proved.
In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.
The concept of bipolar fuzzy ideals in a TM-algebra was introduced and some properties of these ideals are investigated. Also, a few relations between a bipolar fuzzy ideal and T-ideal are discussed. A new bipolar fuzzy set with a homomorphism of TM-algebra is defined. The Cartesian product of bipolar fuzzy T-ideals in Cartesian product TM-algebras is given.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreIn this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.
Remote surveying of unknown bound geometries, such as the mapping of underground water supplies and tunnels, remains a challenging task. The obstacles and absorption in media make the long-distance telecommunication and localization process inefficient due to mobile sensors’ power limitations. This work develops a new short-range sequential localization approach to reduce the required amount of signal transmission power. The developed algorithm is based on a sequential localization process that can utilize a multitude of randomly distributed wireless sensors while only employing several anchors in the process. Time delay elliptic and frequency range techniques are employed in developing the proposed algebraic closed-form solution.
... Show More