Advances in gamma imaging technology mean that is now technologically feasible to conduct stereoscopic gamma imaging in a hand-held unit. This paper derives an analytical model for stereoscopic pinhole imaging which can be used to predict performance for a wide range of camera configurations. Investigation of this concept through Monte Carlo and benchtop studies, for an example configuration, shows camera-source distance measurements with a mean deviation between calculated and actual distances of <5 mm for imaging distances of 50–250 mm. By combining this technique with stereoscopic optical imaging, we are then able to calculate the depth of a radioisotope source beneath a surface without any external positional tracking. This new hybrid technique has the potential to improve surgical localisation in procedures such as sentinel lymph node biopsy.
The aim of this research is to explore the time and space distribution of traffic volume demand and investigate its vehicle compositions. The four selected links presented the activity of transportation facilities and different congestion points according to directions. The study area belongs to Al-Rusafa sector in Baghdad city that exhibited higher rate of traffic congestions of working days at peak morning and evening periods due to the different mixed land uses. The obtained results showed that Link (1) from Medical city intersection to Sarafiya intersection, demonstrated the highest traffic volume in both peak time periods morning AM and afternoon PM where the demand exceeds the capacity along the link corridor. Also, higher values f
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Many studies have been published to address the growing issues in wireless communication systems. Space-Time Block Coding (STBC) is an effective and practical MIMO-OFDM application that can address such issues. It is a powerful tool for increasing wireless performance by coding data symbols and transmitting diversity using several antennas. The most significant challenge is to recover the transmitted signal through a time-varying multipath fading channel and obtain a precise channel estimation to recover the transmitted information symbols. This work considers different pilot patterns for channel estimation and equalization in MIMO-OFDM systems. The pilot patterns fall under two general types: comb and block types, with
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreGovernment expenditure represents one of the controlling financial policies in the economic affairs and management of the economic cycle in order to achieve price stability, raise the rate of output growth and decrease the level of unemployment. The price stability represents one of the macroeconomic goals that all countries seek without exception, regardless of the economic philosophy adopted by each country; in addition to this is raising the productive capacity and reaching the actual output to the level of the expected output, that is, the level of output related to the natural unemployment rate or what is sometimes called the Non-inflationary unemployment rate. The restriction of government expenditure (G=T+∆B/iP+∆M/P) is
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show MoreThe research is dealing with the absorption and fluorescence spectra for the hybrid of an Epoxy Resin doped with organic dye Rhodamine (R6G) of different concentrations (5*10-6, 5*10-5, 1*10-5, 1*10-4, 5*10-4) Mol/ℓ at room temperature. The Quantum efficiency Qfm, the rate of fluorescence emission Kfm (s-1), the non-radiative lifetime τfm (s), fluorescence lifetime τf and the Stokes shift were calculated. Also the energy gap (Eg) for each dye concentration was evaluated. The results showed that the maximum quantum effi
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show More