<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi
... Show MoreIndole acetic acid (IAA) produced from F. oxysporum (F2) was purified by several steps included extraction by cold ethyl acetate ; Column chromatography using silica gel and TLC chromatography . The pure indole acetic acid (IAA) which produce by F. oxysporum (IAA) was tested by ultraviolet spectra at (200-300)nm ; and appear that the maximum absorbance at 229nm , the high performance liquid chromatography (HPLC) used to test the purity of the indole acetic acid and the results showed one peak at appearance time 3.822 min
The plants of genus Heliotropium L. (Boraginaceae) are well-known for containing the toxic metabolites called pyrrolizidine alkaloids (PAs) in addition to the other secondary metabolites. Its spread in the Mediterranean area northwards to central and southern Europe, Asia, South Russia, Caucasia, Afghanistan, Iran, Pakistan, and India, Saudi Arabia, Turkey, and over lower Iraq, Western desert. The present study includes the preparation of various extracts from aerial parts of the Iraqi plant. Fractionation, screening the active constituent, and identification by chromatographic techniques were carried out.Heliotropium europaeum
... Show MoreIn this paper, 3D simulation of the global coronal magnetic field, which use observed line of sight component of the photosphere magnetic field from (MDI/SOHO) was carried out using potential field model. The obtained results, improved the theoretical models of the coronal magnetic field, which represent a suitable lower boundary conditions (Bx, By, Bz) at the base of the linear force-free and nonlinear force free models, provides a less computationally expensive method than other models. Generally, very high speed computer and special configuration is needed to solve such problem as well as the problem of viewing the streamline of the magnetic field. For high accuracy special mathematical treatment was adopted to solve the computation comp
... Show Moreِabstract:In this research we prepared nanofibers by electrospinning from poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission) was studied and found to be at 772 nm, several process parameters were such as concentration of TiO2 , and the effect of distance from nozzle tip to the grounded collector (gap distance). The result of the lower concentration of, the smaller the diameter of nanofiber is. Increasing the gap distance will affect nanofibers diameter.
In this research we prepared nanofibers by electrospinning from
poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission)
was studied and found to be at 772 nm, several process parameters
were such as concentration of TiO2 , and the effect of distance from
nozzle tip to the grounded collector (gap distance). The result of the
lower concentration of, the smaller the diameter of nanofiber is.
Increasing the gap distance will affect nanofibers diameter
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More