In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests showed that the two proposed search methods outperform the famous three step search algorithm.
The reinforced fiberglass in cement slurry reflects the effect on its properties compared to usual additives. Fiberglass is typically used in cement slurry design for one or another of the following goals: (Earth earthquake, bearing storage, and with differential stresses, to enhance cement durability and increase its compressive strength). The main goal is to use glass fiber and ground fiberglass to improve the tensile strength and moderate compressive strength significantly. On the other hand, the use of glass fibers led to a slight increase in the value of thickening time, which is a desirable effect. Eleven glass fiber samples and milled glass fiber were used to show these materials' effect on Iraqi cement with (0.125, 0.25, 0.5
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis contribution provides an atomistic understanding into the impact of W, Nb, and Mo co-substitution at Hf-site of cubic HfO2 lattice to produce Hf1−xTMxO2 system at x = 25%. The calculations have been performed under the framework of density functional theory supported by Habbured parameter (DFT+U). Structural analysis demonstrates that the recorded lattice constants is in good coherence with the previously published results. For the lattice parameters, contraction by 1.33% comparing with the host system has been reported. Furthermore, the doping effect of TM on the band gap leads to its reduction in the resulting Hf0.75TM0.25O2 configurations. The partial density of states (PDOS) indicate that hybridization through localized electroni
... Show MoreBackground. Dental implantation has become a standard procedure with high success rates, relying on achieving osseointegration between the implant surface and surrounding bone tissue. Polyether ether ketone (PEEK) is a promising alternative to traditional dental implant materials like titanium, but its osseointegration capabilities are limited due to its hydrophobic nature and reduced surface roughness. Objective. The aim of the study is to increase the surface roughness and hydrophilicity of PEEK by treating the surface with piranha solution and then coating the surface with epigallocatechin-3-gallate (EGCG) by electrospraying technique. Materials and Methods. The study includes four groups intended to investigate the effect of pir
... Show MoreThe present study explores the solar-induced photocatalytic degradation of reactive red (RR) and reactive turquoise (RT) dyes in a single system using TiO2 immobilized in xanthan gum (TiO2/XG), synthesized using the sol–gel dip-coating technique for direct precipitation. SEM-EDX, XRD, FTIR, and UV–Vis were used to assess the characteristics of the resulting catalyst. Moreover, the effects of different operating parameters, specifically pH, dye concentration, TiO2/XG concentration, H2O2 concentration, and contact time, were also investigated in a batch photocatalytic reactor. The immobilized TiO2/XG catalyst showed a slight adsorption degradation efficiency and then improved the RR and RT dye degradation activity (92.5 and 90.8%
... Show MoreIn this article the nanoparticles synthesis of ZnO (Nps) by using the precipitation method at concentrations range (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/mL and then activity was examined against Streptococcus spp that causing dental caries in vitro by well diffusion method, find these concentrations effected in these bacteria and better concentration is 0.03125. ZnO Nps were characterization by EDS to prove this particles are ZnO, and also characterized by atomic force microscope (AFM), X-ray Diffraction (XRD) and TEM, from these technic found that the average size about 30.52 nm and hexagonal shape. The UV-visible result reveals that the large band is observed at 340.8 nm, Zeta potential show that the surface charge is 30.19 mv an
... Show MoreThe research included studying the effect of different plowing depths (10,20and30) cm and three angles of the disc harrows (18,20and25) when they were combined in one compound machine consisting of a triple plow and disc harrows tied within one structure. Draft force, fuel consumption, practical productivity, and resistance to soil penetration. The results indicated that the plowing depth and disc angle had a significant effect on all studied parameters. The results showed that when the plowing depth increased and the disc angle increased, leads to increased pull force ratio, fuel consumption, resistance to soil penetration, and reduce the machine practical productivity.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More