Applying 4K, (Ultra HD) Real-time video streaming via the internet network, with low bitrate and low latency, is the challenge this paper addresses. Compression technology and transfer links are the important elements that influence video quality. So, to deliver video over the internet or another fixed capacity medium, it is essential to compress the video to more controllable bitrates (customarily in the 1-20 Mbps range). In this study, the video quality is examined using the H.265/HEVC compression standard, and the relationship between quality of video and bitrate flow is investigated using various constant rate factors, GOP patterns, quantization parameters, RC-lookahead, and other types of video motion sequences. The ultra
... Show MoreAlzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of
... Show MoreCandida Berkh. (1923) occurs naturally in the body. But it becomes opportunistic fungi, meaning that it infects humans when there is any weakening of the immune system, such as exposure to chemotherapy, diabetes, or organ transplantation. Most species of Candida grow at a temperature between 20-40 °C and have a pH of 3-8. Human pathogens of Candida species include C. albicans, C. glabrata, C. lusitaniae, C. parapsilosis, C. tropicalis and C. utili. C. albicans has many virulence factors that facilitate injury process. Virulence factors are considered as a measure of pathogenicity, and it is in the form of fungal toxins, enzymes, or cell structures that facilitate infection, as well as pathogen resistance in different conditions. This study
... Show MoreThe objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreSoil water use and water storage vary by vegetative management practices, and these practices affect land productivity and hydrologic processes. This study investigated the effects of agroforestry buffers (AB), grass buffers (GB), and biofuel crops (BC), relative to row crops (RC) on soil water use for a claypan soil in northern Missouri, USA. The experiment located at the Greenley Memorial Research Center included RC, AB, GB, and BC established in 1991, 1997, 1997, and 2012, respectively. Soil water reflectometer sensors installed at 5‐, 10‐, 20‐, and 40‐cm depths monitored soil water from April to November in 2017 and 2018. Results showed significant differences in weekly volumetric water content (VWC) among treatments for all fou
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More