Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels with a medium validity of 76%. There are two kinds of methods, manual and automated, for distress evaluation that are used to assess pavement condition. A committee of three expert engineers in the maintenance department of the Mayoralty of Baghdad did the manual assessment of a highway in Baghdad city by using a Pavement Condition Index (PCI). The automated method was assessed by processing the videos of the road. By comparing the automated with the manual method, the accuracy percentage for this case study was 88.44%. The suggested method proved to be an encouraging solution for identifying cracks and potholes in asphalt pavements and sorting their severity. This technique can replace manual road damage assessment.
The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di
... Show MoreDoppler broadening technique is suggested to monitor the development of tumours. It depends on the sensitivity of positronium (Ps) annihilation parameters to the sub- microstructural changes in biological tissues. This technique uses high resolution HpGe detector to measure the lineshape parameters (S and W) in normal mice's mammary tissues and adenocarcinoma mammary tissues as a function of tumour growth. The results demonstrate that the central parameter (S) decreases and the wing parameter (W) increases as the tumour grow. It is found that the S parameter changes considerably with the distribution of voids which are affected by the tumour development. Therefore the present technique can successfully be employed to monitor the developm
... Show MoreThe diagnosis of acute appendicitis (AA) sometimes is illusive and the accompanying clinical and laboratory manifestations cannot be used for definitive diagnosis. Objective: This study aimed to evaluate the diagnostic value of neutrophil/lymphocyte ratio (NLR) in detection of AA. Materials and Methods: This is a cross-sectional study that included a total of 80 adult patients with AA and 62 age- and gender-matched patients with abdominal pain due to causes other than AA. Three milliliter of peripheral blood were collected from each participant. The NLR was calculated by dividing the absolute neutrophil count by the absolute lymphocyte count. Receiver operating characteristic curve was used to assess the diagnostic value of NLR in detection
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreThe density functional B3LYP is used to investigate the effect of decorating the silver (Ag) atom on the sensing capability of an AlN nanotube (AlN-NT) in detecting thiophosgene (TP). There is a weak interaction between the pristine AlN-NT and TP with the sensing response (SR) of approximately 9.4. Decoration of the Ag atom into the structure of AlN-NT causes the adsorption energy of TP to decrease from − 6.2 to − 22.5 kcal/mol. Also, the corresponding SR increases significantly to 100.5. Moreover, the recovery time when TP is desorbed from the surface of the Ag-decorated AlN-NT (Ag@AlN-NT) is short, i.e., 24.9 s. The results show that Ag@AlN-NT can selectively detect TP among other gases, such as N2, O2, CO2, CO, and H2O.
Background: Chronic periodontitis defined as “an infectious inflammatory disease within supporting tissues of the teeth, progressive attachment loss and bone loss". Aggressive periodontitis is rare which in most cases manifest themselves clinically during youth. It characterized by rapid rate of disease progression .Pro-inflammatory chemokines organized inflammatory responses. Granulocyte chemotactic protein 2 is involved in neutrophil gathering and movement. The purpose of the study is to detect serum of Granulocyte Chemotactic Protein 2 and correlate to periodontal condition in patients with chronic periodontitis, Aggressive periodontitis and Healthy Control subjects and measurement the count of neutrophils for the studied groups. S
... Show MoreEsculin (ESCN) is used in the pharmaceutical industry with intravenous effect, stimulant and anti-inflammatory capillaries, like vitamin P. It is a significant component of many anti-inflammatory remedies such as esqusan, esflazid and anavenol [14]. It is also found in numerous other remedies available in the market such as proctosone, anustat, and ariproct.
To determine experimental conditions, to elucidate retention behavior of esculin in HILIC mode. Moreover, to suggest new ways to separate and determinate esculin in ointments.
Two hydrophilic c
Many carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system
Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)
... Show MoreThe power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha
... Show More