In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred between the proposed and original part so as to demonstrate the verification of the proposed method.
Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreSteganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe study has used Geographic Information Systems (GIS) data and Arc GIS software, to produce a new map. This map contains a spatial database of the newly constructed buildings, in the area of water resources engineering college, and using the above tool for updating contains the college in any time, also the map and browse all buildings individually or in clustered, for example, browsing geometric data, statistical data and the plans of drawings, and make any necessary changes to these sectors immediately, or in the future, like the expansion of the study halls by constructed a new floor, or add supplements, prepare any electrical to any building, and anything else. The paper also, updates the old Google Earth image, f
... Show MoreThis research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r
... Show MoreOrganophosphorus insecticide and growth regulator namely Ethephon (2-chloroethylphosphonic acid) are widely used as a ripening process accelerator and a cultivation duration inhibitor. Pomegranate extract (PPE) has recently been taken into consideration due to its pharmacological effects especially those associated with renal diseases. Thus, this study aims to investigate the possible protective effect of PPE against ethephon-induced nephrotoxicity in rats. In this study four groups of adult male rats were divided into control group, PPE 400 mg/kg group, Ethephon 250 mg/kg group, and finally, PPE + Ethephon group (treated with the same dose of PPE group and Ethephon group). In the current study, kidney function parameters (KIM-1, creatin
... Show MoreThe study consisted in the development and use of a practical method to detect and
monitor, analyze and produce maps of changes in land use and land cover in the district of
Mahmudiya in Baghdad during the period 1990-2007 using the applications of remote sensing
techniques and with the assisstant of geographic information systems (GIS),as a valuable
contribution to land degradation studies.
This study is based maiuly on the processing on two subsets of landsat5 TM images picked up
in August 1990 and 2007 respectively in order to facilitate comparision and were thengeometrically and radiometrcally calibrated ,to used for digital classification purposes using
maximum liklihoods classification or six spectral bands of