Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors
The aim of this study is to investigate the antibacterial capabilities of different coating durations of three nanoparticle (NP) coatings: molybdenum (Mo), tantalum (Ta), and zinc oxide (ZnO), and their effects on the surface characteristics of 316L stainless steel (SS). The coated substrates underwent characterization utilizing field emission scanning electron microscopy (FE-SEM), energy dispersive X-ray spectrometry (EDX), and X-ray diffractometer (XRD) techniques. The antibacterial efficacy of NPs was evaluated using the agar diffusion method. The FE-SEM and EDX images confirmed the presence of nano-sized particles of Mo, Ta, and ZnO on the surface of the substrates with perfectly symmetrical spheres and a uniform distribution of
... Show MoreOne of the functions of Al-Shanasheel was to cool the air, but they could not compete with the Evaporative coolers, As Al-Shanasheel were a sign of luxury and wealth in Arab societies and were only built in homes of wealthy families, they are more expensive than the evaporative coolers, depending on the level of the decoration and the sculpting used to create them aesthetically, where People replaced them with evaporative coolers for their low cost, and higher cooling efficiency. One of the reasons for the disappearance of Al-Shanasheel is the absence of the functional need for them, in exchange for the high cost of construction. The diminished role of Al-Shanasheel in the contemporary urban scene, although they are one of the most
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
The aim of this research is to diagnose the impact of competitive dimensions represented by quality, cost, time, flexibility on the efficiency of e-learning, The research adopted the descriptive analytical method by identifying the impact of these dimensions on the efficiency of e-learning, as well as the use of the statistical method for the purpose of eliciting results. The research concluded that there is an impact of the competitive dimensions on the efficiency of e-learning, as it has been proven that the special models for each of the research hypotheses are statistically significant and at a level of significance of 5%, and that each of these dimensions has a positive impact on the dependent variable, and the research recommended
... Show MoreThe lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreDetection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show More