Preferred Language
Articles
/
alkej-692
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built to perform the proposed algorithm which implemented using a suggested case studies with cylinder and dome shape. The resulted point cloud from application the proposed algorithm and result of surface fitting for the case studies has been proved the proficiency of the proposed chord angle algorithm in pre-processing of data points and clean the point cloud, where the percent of data which was ignored as noisy data points according to proposed chord angle algorithm was arrived to (81.52%) and (75.01%)of total number of data points in point cloud for first and second case study respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 18 2016
Journal Name
International Journal Of Applied Mathematical Research
On common fixed points in generalized Menger spaces
...Show More Authors

R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.

View Publication
Crossref
Publication Date
Fri Jun 18 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Effectiveness of Educational Pillars Based on Vygotsky's Theory in Achievement and Information Processing Among First Intermediate Class Students
...Show More Authors

The aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Jul 04 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of agricultural insurance in the prevention of financing risks in the form of slam : "An Empirical Study on Shikan Insurance and Reinsurance Company
...Show More Authors

The aim of this research is to introduce agricultural insurance, to define financing in the form of salam and the role of agricultural insurance in the prevention of risks to agricultural finance operations in the form of salam by verifying the hypotheses through which to reach the results, including the imposition of risks for agricultural finance in the form of salam, The study of agricultural finance in the form of salm, the deductive approach to the development of the problem of research and hypotheses, and the inductive method to extrapolate the results through analysis and brother The researcher concluded that agricultural insurance works to bridge the risks facing agricultural finance in the form of the ladder in cases of

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Technical Treatment for Pottery Body by (Kintsugi) Technique in Japanese Pottery – Analytic Study
...Show More Authors

The aesthetic and technical expertise help  in producing the artistic work and achieving results in aesthetic formulations that reflect the aesthetic and  expressive dimensions and the reflective dimensions of the pottery, surpassing its traditions, asserting  its active presence in life, cherishing it  even when it  breaks  or get damaged   by employing techniques that are originated  from  the Japanese environment.

                       The research problem is to study how ( Kintsugi) technique and similar techniques are used to create  new rebirths of pottery piec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitat

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of applying the target costing technique on rationalizing pricing decisions in economic units
...Show More Authors

                The research aims to highlight the role played by the target costing technique as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information and scientific foundations it provides in the allocation of indirect costs and the accuracy in measuring the cost from the start of the project planning process up to the production process and indicating the extent of its impact on decisions Pricing in a way that contributes to the rationalization of pricing decisions in economic units in the light of intense competition and the multiplicity of alternatives.

View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Associations Between Phonological Processing and Working Memory in Students with and without Reading disabilities in Basic Education Cycle One Schools in Muscat
...Show More Authors

The study aimed to examine the phonological processing profile for students with and without reading disabilities in cycle 1 schools of basic education in the Governorate of Muscat, Sultanate of Oman. The study participants included 306 students, 165 students with reading disabilities and 141 students without reading disabilities. The Comprehensive Test of Phonological Processing (CTOPP) and Working Memory Test (WMT) were administered to the participants. The results of the study showed that the mean score of students without reading disabilities was higher than that of students of reading disabilities in all measures of phonological processing, and that there are statistically significant differences on the  case of students in all

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication