Eye loss may be caused as a result of eye trauma, accidents, or malignant tumors, which leads the patient to undergo surgery to remove the damaged parts. This research examines the potential of computer vision represented by Structure from Motion (SfM) photogrammetry in fabricating the orbital prosthesis as a noninvasive and low-cost technique. A low-cost camera was used to collect the data towards extracting the dense 3D data of the patient facial features following Structure from Motion-Multi View Stereo (SfM-MVS) algorithms. To restore the defective orbital, a Reverse Engineering (RE) based approach has been applied using the similarity RE algorithms based on the opposite healthy eye to rehabilitate the defected orbital precisely. Following quality assurance and best-fitting statistical analysis, the digital model of the restored eye was converted into a physical model using 3D prototyping. This is later used to fabricate the mold for casting medical-grade silicone to obtain the final orbital prosthesis. The results show the power of SfM photogrammetry by offering a high-accuracy model of 0.048 mm and 0.186 mm relative errors acquired in the horizontal and vertical directions, respectively. These results boost the RE implementation in medicine to reconstruct the patient's damaged eye by mirroring the image of the healthy eye using RE algorithms. Therefore, the margin matching results claim perfect data capture settings and successful data processing workflow as designed in the first place. Consequently, one can claim this approach effectively rehabilitates maxillofacial deformities as an alternative to invasive restoration approaches. The presented approach provided a low-cost and safe workflow that avoids the patient the risks of exposure to harmful rays or magnetic fields available in other sensors.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThe study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l
... Show MoreBackground: Determination of sex from an unknown human bone is an important role in forensic and anthropology field. The mandible is the largest and hardest facial bone, that commonly resist postmortem damage and forms an important source of information about sexual dimorphism. Mandibular ramus can be used to differentiate between sexes and it also expresses strong univariate sexual dimorphism. This study was undertaken to assess the usefulness of mandibular ramus as an aid in sex differentiation using CT scanning among Iraqi population. Materials and methods: 3D reconstructed computed tomography scanning of 140 Iraqi Arab subjects, (7 0 males and 70 females) were analyzed with their age range from 20-60 years old. The linear measurements w
... Show MoreA fully automatic electrothermal atomic emission spectrometry (ETA-AES) is described. This system is based on an echelle monochromator modified for wave¬length modulation which is completely controlled by microcomputer . The advantages of the system in atomic spectrometry have been discussed . Aspects of the analytical performances such as calibration ? dection limit, precision , and recovery for copper are considered . This system is applied for routine determination of copper in commercial powdered mill? by slurr>' atomization versus aqueous atomization techniques.
The study aimed to investigate the employment of electronic supervision applications in developing the teaching performance of teachers in Oman. Based on the qualitative method and the study population consisted of all the teachers of the first cycle in the Governorate of Muscat. The study sample amounted to 24 female teachers. The interview was used as a tool for data collection. The study reached several results, including: There are difficulties in employing electronic supervision applications, which are weak network, density of curricula, lack of experience in applying technology, and the large number of tasks assigned to the teacher. These difficulties can also be overcome by strengthening the network, training teachers, reducing th
... Show MoreDylan Thomas (1914-1953) is a modern poet belongs to the apocalyptic movement of the 1940's.This movement is influenced by the doctrines and techniques of surrealism.
Poetry for him should not be primarily concerned with man in society, but with the celebration of spiritual truth. It should bring to light the hidden causes, hence his personal interest is to strip darkness and explore the inward motives. To do this he uses a cluster of images: a constant building up and breaking down of images. His poetry depends on the romantic spontaneity, suggestiveness of the Symbolists and the the surrealists' mysterious liberation of the unconsciousness and
... Show Moreيهدف البحث الى تحليل الخيارات الاستراتيجية للاقتراض الخارجي في العراق لاستشراف افضل الخيارات الاستراتيجية المستقبلية في مجال الاقتراض الخارجي في دائرة الدين العام في وزارة المالية ، وقد استخدم الباحث منهج دراسة الحالة وباستعمال اسلوب تحليل خوارزمية ال K-Means لتشخيص كفاءة الاقتراض الخارجي لعينة البحث البالغة (81) قرضا التي اقترضتها وزارة المالية للفترة 2007-2020 . ولقد كان الغرض الرئيسي للبحث المساهمة في تمكين وزا
... Show More