In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreBackground: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreA new class of higher derivatives for harmonic univalent functions defined by a generalized fractional integral operator inside an open unit disk E is the aim of this paper.
In this study, pebble bed as an absorber and storage material was placed in a south facing, flat plate air-type solar collector at fixed tilt angle of (45°). The effect of this material and differ- ent parameters on collector efficiency has been investigated experimentally and
theoretically. Two operation modes were employed to study the performance of the solar air heater. An inte- grated mode of continuous operation of the system during the period of (11:00 am – 3:00 pm) and non-integrated mode in which the system stored the solar energy through the day then used the stored energy during the period of (3:00 pm – 8:00 pm). The results of parametric study in case of continuous operating showed that the maximum average temperatur
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThe performance of a diesel engine was tested with diesel oil contaminated with glycol at the engineering workshop/Department of Agricultural Machines and Equipment / College of the Agricultural Engineering Sciences at the University of Baghdad. To investigate the impact of different concentrations of glycol on the performance of a diesel engine, an experimental water-cooled four-stroke motor was utilized, with oil containing 0, 100, and 200 parts per million (ppm). Specific fuel consumption, thermal efficiency, friction power, and exhaust gas temperature were examined as performance indicators. To compare the significance of the treatments, the study employed a full randomization des
The performance of a diesel engine was tested with diesel oil contaminated with glycol at the engineering workshop/Department of Agricultural Machines and Equipment / College of the Agricultural Engineering Sciences at the University of Baghdad. To investigate the impact of different concentrations of glycol on the performance of a diesel engine, an experimental water-cooled four-stroke motor was utilized, with oil containing 0, 100, and 200 parts per million (ppm). Specific fuel consumption, thermal efficiency, friction power, and exhaust gas temperature were examined as performance indicators. To compare the significance of the treatments, the study employed a full randomization des