The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present study proposes the use of a hybrid image segmentation technique to acquire precise segmentation outcomes, while engaging “Alpha Shape (α-Shape)” in supposition to derive the original contour, followed by a refining process through engaging a conventional active contour model. Empirical results show high potential in the suggested computational method. Trials indicate that the primary contour is capable of being precisely set next to the objective contour and effectively have these objective contours extracted, devoid of any contour instigation. Some of the benefits associated with the novel hybrid contour include minimized cost of computation, enhanced anti-jamming capability, as well as enlarged utilization array of snake model.
Efforts of evaluating manuscripts have developed into sciences that take interest into the development of authorship movement. Expanding the rules and fundamentals of this scientific process along with the growing use of modern methods and techniques contributed further to its development.
Such a disciplinedemands comprehensive knowledge in various fields to reach the most valid results that help reveal significant aspects of the cultural heritage since such a process is an ethical responsibility .Therefore, the editor has to be patient and honest in correcting mistakes, choosing the most acceptable narration and pinpointing the additions and differences as well as other requirements of serious editing.
The study was divided into a
The issue of epistemology is one of the theological issues that were and still is a relentless pursuit of knowledge, knowing the true knowledge of certainty. Therefore, it formed a main focus because of its great importance expressing the deep desire of the human soul to explore the self and reality and answer all the questions that it may raise. Knowledge is the highest function. For man to exist.
Therefore, the establishment of epistemology was general in knowledge, a characteristic that was distinguished, as it is an ancient and renewed subject that is still being raised and raised, although there are many methods of treating it and sacred solutions to it. To finally prove its potentia
... Show MoreThree of imide intermediate products were synthesized by reacting of phthalic anhydride with glycine (2a), and tetrachloro phthalic anhydride with glycine , (S)-2-[(tert-Butoxycarbonyl)amino]-3-aminopropionic acid ( 2b,c) respectively in dry toluene with azeotropic removal of water using Dean- stark apparatus then carboxyl functional group activated by refluxing with thionyl chloride, the resulted acid chloride (3a-c) were reacted with different amine (5-flourouracil, 4-chloroaniline, 4-bromoaniline, 2-amino thiazole, and pyrrolidine) (4a-e) , the resulted products consider as
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More