Keratoconus Severity Detection From Elevation, Topography and Pachymetry Raw Data Using a Machine Learning Approach
...Show More Authors
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAccurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreEverybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreTraffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show MoreThis study aims to analyze the spectral properties of plasma produced from rice husk(Rh) using the laser breakdown spectroscopy (LIBS) method. The plasma generation process used the fundamental harmonic (1064 nm) of a Q-switched Nd:YAG laser. Yttrium aluminum garnet (YAG) is a man-made crystalline material. The laser fired pulses with a duration of 10 ns and a repetition rate of 6 Hz. Thus, the energy outputs achieved were 50–200 mJ at the wavelength of 1064 (nm). The silica content in the rice hulls was verified using an XRF measurement, which revealed the presence of silica in the rice hulls in a high percentage. Precise beam focusing was achieved by focusing the laser on the target material. This target material is placed with
... Show MoreIsobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo
... Show MoreThe effect of compound machine on wheat "Tamuz cultivar" was studied based on some technical indicators which were tested under three practical speed (PS) of 2.015, 3.143, and 4.216 km.hr-1 and three tillage depth (TD) of 11, 13, and 15cm. The split-split plot arrangement in RCBD with three replications was used. The results showed that the PS of 2.015km.hr-1 was major best than other two speed in all studied conditions, physical properties (SBD and TSP), mechanical parameters (FD, (DP and LAS), and yield and growth parameters (PVI, BY and HI). The TD of 11cm was major effect to the other two levels TD of 13 and TD of 15cm in all studied conditions. All interactions were significant,
The effect of compound machine on wheat "Tamuz cultivar" was studied based on some technical indicators which were tested under three practical speed (PS) of 2.015, 3.143, and 4.216 km.hr-1 and three tillage depth (TD) of 11, 13, and 15cm. The split-split plot arrangement in RCBD with three replications was used. The results showed that the PS of 2.015km.hr-1 was major best than other two speed in all studied conditions, physical properties (SBD and TSP), mechanical parameters (FD, (DP and LAS), and yield and growth parameters (PVI, BY and HI). The TD of 11cm was major effect to the other two levels TD of 13 and TD of 15cm in all studied conditions. All interactions were significant,