This research reports an error analysis of close-range measurements from a Stonex X300 laser scanner in order to address range uncertainty behavior based on indoor experiments under fixed environmental conditions. The analysis includes procedures for estimating the precision and accuracy of the observational errors estimated from the Stonex X300 observations and conducted at intervals of 5 m within a range of 5 to 30 m. The laser 3D point cloud data of the individual scans is analyzed following a roughness analysis prior to the implementation of a Levenberg–Marquardt iterative closest points (LM-ICP) registration. This leads to identifying the level of roughness that was encountered due to the range-finder’s limitations in close-ranging as well as measurements that were obtained from extreme incident angle signals. The measurements were processed using a statistical outlier removal (SOR) filter to reduce the noise impact toward a smoother data set. The geometric differences and the RMSE values in the 3D coordinate directions were computed and analyzed, which showed the potential of the Stonex X300 measurements in close-ranging following a careful statistical analysis. It was found that the error differences in the vertical direction had a consistent behavior when the range increased, whereas the errors in the horizontal direction varied. However, it is more common to produce errors in the vertical direction as compared to the horizontal one.
PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreCholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.
This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).
In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6
... Show MoreIn this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThis research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show MoreDBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020
Background Rectal cancer is one of the most common malignant tumors of gastrointestinal tract. Combining chemotherapy with radiotherapy has a sound effect on its management.
Objectives Assessment the patterns of characterizations of rectal cancer. Evaluation of the efficacy, and long-term survival of pre-/ postoperative chemoradiation. Collecting all eligible evidence articles and summarize the results.
Methods By this systematic review and meta-analysis study, we include data of chemoradiation of rectal cancer articles from 2015 until 2019. The research was carried out at Baghdad Medical City oncology centers. Accordance with the
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show More