Groupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is efficient, has very few free parameters to tune, and the authors show how to tune the few remaining parameters. Results show that the method reliably aligns various datasets including two facial datasets and two medical datasets of prostate and brain MRI images and demonstrates efficiency in terms of performance and a reduction of the computational cost.
The shear strength of soil is one of the most important soil properties that should be identified before any foundation design. The presence of gypseous soil exacerbates foundation problems. In this research, an approach to forecasting shear strength parameters of gypseous soils based on basic soil properties was created using Artificial Neural Networks. Two models were built to forecast the cohesion and the angle of internal friction. Nine basic soil properties were used as inputs to both models for they were considered to have the most significant impact on soil shear strength, namely: depth, gypsum content, passing sieve no.200, liquid limit, plastic limit, plasticity index, water content, dry unit weight, and initial
... Show More This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreBackground: Mitral valve stenosis is a condition in which the hearts mitral valve is narrowed (stenosis), This narrowing blocks the valve from opening properly obstructing blood flow through the heart and the rest of the body and this causes changes in physical parameters (resistance and conductance). Aim of the study: To assess the changes in the physical parameters in mitral valve stenosis disease in different gender and age by using Doppler ultrasound. Methods : The examination of patients at the Division of Echo - at the Iraqi Center for Heart Disease in Medical City for surgery specialist - Baghdad - Iraq, during(February2009 till November2010). The current study included fifty eight cases containing (27 males and 31 females) ages rang
... Show MoreA simplified theoretical comparison of the hydrogen chloride (HCl) and hydrogen fluoride (HF) chemical lasers is presented by using computer program. The program is able to predict quantitative variations of the laser characteristics as a function of rotational and vibrational quantum number. Lasing is assumed to occur in a Fabry-Perot cavity on vibration-rotation transitions between two vibrational levels of hypothetical diatomic molecule. This study include a comprehensive parametric analysis that indicates that the large rotational constant of HF laser in comparison with HCl laser makes it relatively easy to satisfy the partial inversion criterion. The results of this computer program proved their credibility when compared with th
... Show MoreIn this research, (MOORA) approach based– Taguchi design was used to convert the multi-performance problem into a single-performance problem for nine experiments which built (Taguchi (L9) orthogonal array) for carburization operation. The main variables that had a great effect on carburizing operation are carburization temperature (oC), carburization time (hrs.) and tempering temperature (oC). This study was also focused on calculating the amount of carbon penetration, the value of hardness and optimal values obtained during the optimization by Taguchi approach and MOORA method for multiple parameters. In this study, the carburization process was done in temperature between (850 to 950 ᵒC) for 2 to 6
... Show MoreThis study included synthesizing silver nanoparticles (AgNPs) in a green method using AgNO3 solution with glucose exposed to microwave radiation. The prepared NPs were also characterized using ultraviolet and visible (UV-vis) spectroscopy and scanning electron microscopy (SEM). The UV/vis spectroscopy confirmed the production of AgNPs, while SEM analysis showed that the typical spherical AgNPs were 30 nm and 50 nm in size for the NPs prepared using black tea (B) and green tea (G) as reducing agent, respectively. The changes in some of the biochemical parameters related to the liver and kidneys have been analyzed to evaluate the probable toxic effects of AgNPs. 40 adult male mice were included in this study. To assess the probable he
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More