In this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image, the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the
... Show MoreOne of the troublesome duties in chemical industrial units is determining the instantaneous drop size distribution, which is created between two immiscible liquids within such units. In this work a complete system for measuring instantaneous droplet size is constructed. It consists of laser detection system (1mW He-Ne laser), drop generation system (turbine mixer unit), and microphotography system. Two immiscible liquids, water and kerosene were mixed together with different low volume fractions (0.0025, 0.02) of kerosene (as a dispersed phase) in water (as a continuous phase). The experiments were carried out at different rotational speed (1180- 2090 r.p.m) of the turbine mixer. The Sauter mean diameter of the drops was determined by la
... Show MoreSelective recovery of atropine from Datura innoxia seeds was studied. Applying pertraction in a rotating film contactor (RFC) the alkaloid was successfully recovered from native aqueous extracts obtained from the plant seeds. Decane as a liquid membrane and sulfuric acid as a stripping agent were used. Pertraction from native liquid extracts provided also a good atropine refinement, since the most of co-extracted from the plant species remained in the feed or membrane solution. Solid–liquid extraction of atropine from Datura innoxia seeds was coupled with RF-pertraction in order to purify simultaneously the extract obtained from the plant. Applying the integrated process, proposed in this study, a product containing 92.6% atropine was
... Show MoreThe aim of this paper is to present a method for solving third order ordinary differential equations with two point boundary condition , we propose two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by compared with conventional method .
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreKE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Drugs in Dermatology: JDD, 2013 - Cited by 22
This study aims to identify changes in vegetation cover and its impact on the climate of Mosul City. The analytical method of the study relies on changes in Land Use/Land Cover (LULC), Normalized Difference Vegetation Index (NDVI), and Land Surface Temperature (LST); GIS technology was used to measure these statistics. Landsat (5,8) imagery was used to detect the change in vegetation cover change and land surface temperature during the study period from 2010 to 2022, where the unsupervised classification technique was used to determine LU variations. The results revealed significant changes among the LU classes during the study period, primarily due to human activities. The most prominent change in LU was the urban expansion of agricultural
... Show MoreBackground: This in vitro study was carried out to evaluate the effect of various endodontic irrigants (sodium hypochlorite, ethylene diaminetetracetic acid and normal saline) on sealing ability of (Biodentine, mineral trioxide aggregate, and amalgam) used to repair furcal perforations. Material and methods: One hundred and twenty extracted human molars with divergent roots were used in this study. A standard root canal access cavity was prepared in each tooth and furcal perforation was made and was standardized by using k file size 100 instrument to get a perforation of (1.32mm) in diameter .The teeth were randomly divided in to three groups of 40 teeth according to the type of material used to repair the perforations (Group A: The furcal
... Show MoreThis research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More