This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods
This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram, and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods.
The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib
... Show MoreBackground: Powerlifters and bodybuilders use anabolic androgenic steroids (AAS) especially – as many as 55 percent of elite powerlifters admitted using these agents. In contrast to numerous documented toxic and hormonal effects of AAS their impact on the structure and function of the left ventricular (LV) was not yet fully understood.
Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreThis paper presents the results of experimental investigation carried out on concrete model piles to study the behaviour of defective piles. This was achieved by employing non-destructive tests using ultrasonic waves. It was found that the reduction in pile stiffness factor is found to be about (26%) when the defect ratio increased from (5%) to (15%). The modulus of elasticity reduction factor as well as the dynamic modulus of elasticity reduction factor increase with the defect ratio
With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreA rapid, simple and sensitive spectrophotometric method for the determination of trace amounts of chromium is studied. The method is based on the interaction of chromium with indigo carmine dye in acidic medium and the presence of oxalates as a catalyst for interaction, and after studying the absorption spectrum of the solution resulting observed decrease in the intensity of the absorption. As happened (Bleaching) for color dye, this palace and directly proportional to the chromium (VI) amount was measured intensity of the absorption versus solution was figurehead at a wavelength of 610 nm. A plot of absorbance with chromium (VI) concentration gives a straight line indicating that Beer’s law has been obeyed over the range of 0.5
... Show More