Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensities. In the third stage, the boundary of the target object is extracted, and in the fourth and fifth stages, respectively, the region of interest (ROI) is highlighted and reconstructed. Our model was tested and evaluated using realistic scenarios which include outdoor and indoor scenes. The results reflect the ability of our approach to detect and remove shadows and reconstruct a shadow free image with a small error of approximately 6%.
This study was conducted to determine the fungal cause and bio control of damping off and root rot of wheat plants by using pseudomonas fluorescens under greenhouse and field conditions. Results showed isolation of eight species from the soil and roots to deferent region of Baghdad government. Rhizoctonia solani (Rs) and Fusarium solani (Fs) were the predominant damping off fungus with frequency 60 and 52% respectively. Led the using of bacteria formulations such as crud suspension , pure bacteria filtration and pure living cells in culture medium inhibit all type fungi with rates ranging from 84-96% , 80- 93% and 75-88% respectively. Rs and Fs were more pathogenesis under greenhouse conditions, with incidence of 80 and 68% and disease s
... Show MoreGastrointestinal diseases and especially chronic gastritis are mainly induced by Helicobacter pylori infection, and provides the basis for gastric carcinogenesis and colorectal cancer. The study involved the detection of serum anti-H. pylori IgG and IgA antibody of and some serum biomarkers ;CEA and CA19-9 in patients with gastrointestinal diseases. Fifty eight serum samples were collected from 25 males and 33 females .Peripheral venous blood was collected from each patient and sera obtained by centrifugation. Serum anti-H. pylori IgG and IgA ,serum CEA and CA19-9 were evaluated by enzyme-linked immunoadsorbent assays (ELISA).Forty eight serum samples were positive for IgG (82.7% ) divided int
... Show MoreBackground: Urinary tract infections (UTIs) and their complications such as Bladder cancer (Bl. C.) are a health growing problem worldwide. Objective: To shed light on this subject, present study was done to investigate relationship between recurrent urinary tract infection (RUTI) due to Escherichia coli (E. coli) and Bl. C.Type of study: Cross-sectional study. Methods: This study included 130 patients with RUTI, 50 patients with Bl. C. and 50 control of both sexes (aged 7-85 years) attending Al-Zahra Teaching Hospital in Al-Kut/Wassit governorate and Al-Harery Teaching Hospital of specialized surgeries/Baghdad. The patients were divided into two groups: the first group (n=130) included those who were suffering from recurrent UTI without
... Show MoreE-learning applications according to the levels of enlightenment (STEM Literacy) for physics teachers in the secondary stage. The sample consists of (400) teachers, at a rate of (200) males (50%), and (200)females (50%), distributed over (6) directorates of education in Baghdad governorate on both sides of Rusafa and Karkh. To verify the research goals, the researcher built a scale of e-learning applications according to the levels of STEM Literacy, which consists of (50) items distributed over (5) levels. The face validity of the scale and its stability were verified by extracting the stability coefficient through the internal consistency method “Alf-Cronbach”. The following statistical means were used: Pearson correlation coefficient,
... Show MoreOne of the unique properties of laser heating applications is its powerful ability for precise pouring of energy on the needed regions in heat treatment applications. The rapid rise in temperature at the irradiated region produces a high temperature gradient, which contributes in phase metallurgical changes, inside the volume of the irradiated material. This article presents a comprehensive numerical work for a model based on experimentally laser heated AISI 1110 steel samples. The numerical investigation is based on the finite element method (FEM) taking in consideration the temperature dependent material properties to predict the temperature distribution within the irradiated material volume. The finite element analysis (FEA) was carried
... Show MoreReal Time Extended (RTX) technology works to take advantage of real-time data comes from the global network of tracking stations together with inventor locating and compression algorithms to calculate and relaying the orbit of satellite, satellite atomic clock, and any other systems corrections to the receivers, which lead to real-time correction with high accuracy. These corrections will be transferred to the receiver antenna by satellite (where coverage is available) and by IP (Internet Protocol) for the rest of world to provide the accurate location on the screen of smartphone or tablet by using specific software. The purpose of this study was to assess the accuracy of Global Navig
Due to the urgent need to develop technologies for continuous glucose monitoring in diabetes individuals, poten tial research has been applied by invoking the microwave tech niques. Therefore, this work presents a novel technique based on a single port microwave circuit, antenna structure, based on Metamaterial (MTM) transmission line defected patch for sensing the blood glucose level in noninvasive process. For that, the proposed antenna is invoked to measure the blood glu cose through the field leakages penetrated to the human blood through the skin. The proposed sensor is constructed from a closed loop connected to an interdigital capacitor to magnify the electric field fringing at the patch center. The proposed an tenna sensor i
... Show MoreReal Time Extended (RTX) technology works to take advantage of real-time data comes from the global network of tracking stations together with inventor locating and compression algorithms to calculate and relaying the orbit of satellite, satellite atomic clock, and any other systems corrections to the receivers, which lead to real-time correction with high accuracy. These corrections will be transferred to the receiver antenna by satellite (where coverage is available) and by IP (Internet Protocol) for the rest of world to provide the accurate location on the screen of smartphone or tablet by using specific software. The purpose of this study was to assess the accuracy of Global Navig
The research aimed to modeling a structural equation for tourist attraction factors in Asir Region. The research population is the people in the region, and a simple random sample of 332 individuals were selected. The factor analysis as a reliable statistical method in this phenomenon was used to modeling and testing the structural model of tourism, and analyzing the data by using SPSS and AMOS statistical computerized programs. The study reached a number of results, the most important of them are: the tourist attraction factors model consists of five factors which explain 69.3% of the total variance. These are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And the differenc
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More