Computer vision seeks to mimic the human visual system and plays an essential role in artificial intelligence. It is based on different signal reprocessing techniques; therefore, developing efficient techniques becomes essential to achieving fast and reliable processing. Various signal preprocessing operations have been used for computer vision, including smoothing techniques, signal analyzing, resizing, sharpening, and enhancement, to reduce reluctant falsifications, segmentation, and image feature improvement. For example, to reduce the noise in a disturbed signal, smoothing kernels can be effectively used. This is achievedby convolving the distributed signal with smoothing kernels. In addition, orthogonal moments (OMs) are a crucial technique in signal preprocessing, serving as key descriptors for signal analysis and recognition. OMs are obtained by the projection of orthogonal polynomials (OPs) onto the signal domain. However, when dealing with 3D signals, the traditional approach of convolving kernels with the signal and computing OMs beforehand significantly increases the computational cost of computer vision algorithms. To address this issue, this paper develops a novel mathematical model to embed the kernel directly into the OPs functions, seamlessly integrating these two processes into a more efficient and accurate approach. The proposed model allows the computation of OMs for smoothed versions of 3D signals directly, thereby reducing computational overhead. Extensive experiments conducted on 3D objects demonstrate that the proposed method outperforms traditional approaches across various metrics. The average recognition accuracy improves to 83.85% when the polynomial order is increased to 10. Experimental results show that the proposed method exhibits higher accuracy and lower computational costs compared to the benchmark methods in various conditions for a wide range of parameter values.
ABSTRACT Background: This study aimed to study the effect of some acidic drinks (Vinegars and fresh Orange juice) and energy drinks (Red bull) on surface roughness of three types of bulkfill composite materials: Filtek posterior bulkfill (3M), Sonicfill (Kerr) and Filtek p60 (3M). Materials and Methods: Total number of 120 samples are prepared by using a mold of (12mm diameter and 3mm height), which were divided into three groups forty samples for each group: Group A: Filtek bulkfill posterior composite (3M), Group B: Sonicfill composite (Kerr), Group C: Filtek P60 (3 M) which then divided into four sub- groups (n=10) (1) samples were kept in distilled water as a control group (2) samples were immersed in Redbull (3) samples were immersed
... Show MoreOryza sativa japonica (ofada rice) is largely grown in Aramoko, Abakaliki and Ofada are communities and consumed by both the poor and rich in Nigeria. A total of twenty ofada rice farmlands were identified in each study area and rice samples were randomly collected, thoroughly mixed to make a representative sample from each farmland. Soil samples were collected in each farm to a depth of 5-15cm from at least eight different points and thoroughly mixed together to form a representative sample. The samples were thereafter taken to the laboratory for preparation and spectroscopic analysis. A well-calibrated NaI(Tl) gamma-ray detector was used in spectrometric analysis of the samples and descriptive statistics was used to analyze th
... Show MoreAbstract Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma. This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthmatic patients in Baghdad City. The study com
... Show MoreAbstract
Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma.
This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm
... Show MoreAn optimization study was conducted to determine the optimal operating pressure for the oil and gas separation vessels in the West Qurna 1 oil field. The ASPEN HYSYS software was employed as an effective tool to analyze the optimal pressure for the second and third-stage separators while maintaining a constant operating pressure for the first stage. The analysis involved 10 cases for each separation stage, revealing that the operating pressure of 3.0 Kg/cm2 and 0.7 Kg/cm2 for the second and third stages, respectively, yielded the optimum oil recovery to the flow tank. These pressure set points were selected based on serval factors including API gravity, oil formation volume factor, and gas-oil ratio from the flow tank. To impro
... Show MoreThe current study performs an explicit nonlinear finite element simulation to predict temperature distribution and consequent stresses during the friction stir welding (FSW) of AA 7075-T651 alloy. The ABAQUS® finite element software was used to model and analyze the process steps that involve plunging, dwelling, and traverse stages. Techniques such as Arbitrary Lagrangian–Eulerian (ALE) formulation, adaptive meshing, and computational feature of mass scaling were utilized to simulate sequence events during the friction stir welding process. The contact between the welding tool and workpiece was modelled through applying Coulomb’s friction model with a nonlinear friction coefficient value. Also, the model considered the effect of nonlin
... Show MoreSuccessfully, theoretical equations were established to study the effect of solvent polarities on the electron current density, fill factor and efficiencies of Tris (8-hydroxy) quinoline aluminum (Alq3)/ ZnO solar cells. Three different solvents studied in this theoretical works, namely 1-propanol, ethanol and acetonitrile. The quantum model of transition energy in donor–acceptor system was used to derive a current formula. After that, it has been used to calculate the fill factor and the efficiency of the solar cell. The calculations indicated that the efficiency of the solar cell is influenced by the polarity of solvents. The best performance was for the solar cell based on acetonitrile as a solvent with electron current density of (5.0
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More