This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one pixel-wide lines. Finally, the Fusion technique was used to merge the results of the Histogram Equalization process with the Skeletonization process to obtain the new high contrast images. The proposed method was tested in different quality images from National Institute of Standard and Technology (NIST) special database 14. The experimental results are very encouraging and the current enhancement method appeared to be effective by improving different quality images.
In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
A new type of the connected domination parameters called tadpole domination number of a graph is introduced. Tadpole domination number for some standard graphs is determined, and some bounds for this number are obtained. Additionally, a new graph, finite, simple, undirected and connected, is introduced named weaver graph. Tadpole domination is calculated for this graph with other families of graphs.
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe aim of this article is to introduce a new definition of domination number in graphs called hn-domination number denoted by . This paper presents some properties which show the concepts of connected and independent hn-domination. Furthermore, some bounds of these parameters are determined, specifically, the impact on hn-domination parameter is studied thoroughly in this paper when a graph is modified by deleting or adding a vertex or deleting an edge.
The current research aims to determine the requirements of Trends of International Mathematics and Science Study (TIMSS 2019) and to find out the extent to which the content of science textbooks for grades (1-4) in the Sultanate of Oman includes the requirements of (TIMSS 2019). Only the Cognitive Process dimension has been considered when conducting the analysis. The study population includes all science books from the first to the fourth grade for the academic year 2021-2022. The study identified and organized the requirements in the study tool, which is a list of requirements of (TIMSS 2019). After confirming its validity and reliability, the analysis was performed, and data were collected and analyzed statistically using frequencies
... Show MoreAt thermal energies near stellar conditions, nuclear reactions are sensitive to resonance strengths of the nuclear reaction cross-section. In this paper, the resonance strengths of nuclear reaction were evaluated numerically by means of nuclear reaction rate calculations using a written Matlab code, at the energies of interest in stellar nuclear reactions. The results were compared with standard reaction before and after application of a statistical analyses, to select the best parameters that made theoretical results as close as possible to the standard values. Fitting was made for different temperature ranges up to 10 GK, 0.6 GK and 0.25 GK. The evaluated results showed that as the temperature range becomes narrower, more error is ad
... Show MoreAbstract
Magnetic abrasive finishing (MAF) process is one of non-traditional or advanced finishing methods which is suitable for different materials and produces high quality level of surface finish where it uses magnetic force as a machining pressure. A set of experimental tests was planned according to Taguchi orthogonal array (OA) L27 (36) with three levels and six input parameters. Experimental estimation and optimization of input parameters for MAF process for stainless steel type 316 plate work piece, six input parameters including amplitude of tooth pole, and number of cycle between teeth, current, cutting speed, working gap, and finishing time, were performed by design of experiment
... Show MoreCyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreThis paper presents results about the existence of best approximations via nonexpansive type maps defined on modular spaces.
The study area of Baghdad region and nearby areas lies within the central part of the Mesopotamia plain. It covers about 5700 Km2. The remote sensing techniques are used in order to produce possible Land Use – Land Cover (LULC) map for Baghdad region and nearby areas depending on Landsat TM satellite image 2007. The classification procedure which was developed by USGS used and followed with field checking in 2010. Land Use-land cover digital map is created depending on maximum likelihood classifications (ML) of TM image using ERDAS 9.2.The LULC raster image is converted to vector structure, using Arc GIS 9.3 Program in order to create a digital LULC map. This study showed it is possible to produce a digital map of LULC and it can be co
... Show More