Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show Morecontent Analysis for Some Type of Pillows used in Iraqi houses
The present work aims to validate the experimental results of a new test rig built from scratch to evaluate the thermal behavior of the brake system with the numerical results of the transient thermal problem. The work was divided into two parts; in the first part, a three-dimensional finite-element solution of the transient thermal problem using a new developed 3D model of the brake system for the selected vehicle is SAIPA 131, while in the second part, the experimental test rig was built to achieve the necessary tests to find the temperature distribution during the braking process of the brake system. We obtained high agreement between the results of the new test rig with the numerical results based on the developed model of the brake
... Show MoreThe objective of the conventional well testing technique is to evaluate well- reservoir interaction through determining the flow capacity and well potential on a short-term basis by relying on the transient pressure response methodology. The well testing analysis is a major input to the reservoir simulation model to validate the near wellbore characteristics and update the variables that are normally function of time such as skin, permeability and productivity multipliers.
Well test analysis models are normally built on analytical approaches with fundamental physical of homogenous media with line source solution. Many developments in the last decade were made to increase the resolution of transient response derivation to meet the
... Show MoreEarth dams are constructed mainly from soil. A homogenous earth dam is composed of only one material. The seepage through such dams is quite high. Upstream impervious blanket is one of the methods used to control seepage through the dam foundations. Bennet's method is one of the commonly used methods to design an impervious upstream blanket. Design charts are developed relating the length of blanket, total reservoir head, total base width of the dam (excluding downstream drainage), the coefficient of permeability of the blanket material, blanket thickness, foundation thickness, and coefficient of permeability of the foundation soil, based on the equations governing the Bennet's method for a homogenous earth dam with a blanket of uniform
... Show MoreIn this paper, a sufficient condition for stability of a system of nonlinear multi-fractional order differential equations on a finite time interval with an illustrative example, has been presented to demonstrate our result. Also, an idea to extend our result on such system on an infinite time interval is suggested.
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show More