Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the shape object image in Case 1 is relocated to the center of the image. In Case 3, the proposed method first detect the outer boundary of the shape object and then resizing the object to the boundary of the image. Experimental investigations were made by using two benchmark shape image datasets showed that the proposed method in Case 3 had demonstrated to provide the most superior image retrieval performances as compared to both the Case 1 and Case 2. As a conlusion, to fully capture the powerful shape representation properties of the Zernike moment, a shape object should be resized to the boundary of the image.
ABSTRACT Purpose: the aim of this in vitro study was to compare the marginal gap and internal fitness between single crowns and the crowns within three-unit bridges of zirconium fabricated by CAD-CAM system. Materials and methods: A standard model from ivoclar company was used as a pattern to simulate three-units bridge (upper first molar and upper first premolar) as abutments used to fabricate stone models, eight single crowns for premolar and eight of three units bridges. Crowns and bridges fabricated by CAD-CAM system were cemented on their respective stone models then sectioned at the mid-point buccolingaully and misiodistaly and examined under stereomicroscope. Result: the marginal gap in premolar crowns and premolar within bridge we
... Show MoreIn this study, the electro-hydraulic servo system for speed control of fixed displacement hydraulic motor using proportional valve and (PID) controller is investigated theoretically ,experimentally and simulation . The theoretical part includes the derivation of the nonlinear mathematical model equation of (valve – motor ) combination system and the derivation of the transfer function for the complete hydraulic system , the stability test of the system during the operation through the transfer function using MATLAB package
V7.1 have been done. An experimental part includes design and built hydraulic test rig and simple PID controller .The best PID gains have been calculated experimentally and simulation, speed control performance te
The Iraqi-Kuwaiti relations represent a great issue for the Arab-Arab relations. This relation is characterized by specificity for the tension since the foundation of the State of Kuwait until late. There are many factors that prevented the fulfillment of the aspiration towards the development of the relations, perhaps the most important of which is the issue of Mubarak Great Port which is a difficult issue as far as the relation between the two states is concerned. One year after Iraq put the cornerstone of the Great Faw Port. This is considered as the most important hurdle in front of constructing the relations with the neighbor Kuwait
The financial analysis of the published financial statements is the means that enables businessmen, financial institutions, financial analysts and others to conduct their studies and conclusions to obtain information that helps them in the decision-making process, including decisions related to investment. National in making the decision on the investment activity, for the period from 2012 to 2018, through the information provided by the annual financial statements, by selecting a set of indicators provided by the financial statements, namely (liquidity ratio, activity percentage, profitability ratios) to measure the extent of this ability Indicators in determining their role in making an investment decision.
Chronic periodontitis (CP) is an inflammatory disease affecting tooth supporting structures in response to bacterial dental plaque causing irreversible tissue destruction. Cyclooxygenase-2 (COX-2) is an effective mediator in the pathogenesis of periodontitis. Polymorphisms in the COX-2 gene may contribute to its overexpression and increased disease susceptibility. To evaluate the association between -1195 A/G single nucleotide polymorphism (SNP) in the promotor area of the cyclooxygenase-2(COX-2) gene and severity of chronic periodontitis in a sample of Iraqi population. -1195A/ G COX-2 SNP was investigated in 70 chronic periodontitis (CP) cases and 30 healthy controls. CP cases composed of 2 subgroups (35 moderate CP cases and 35 severe CP
... Show MoreWe refer in this research into linguistic binaries, try rounding of simiaei news analysis. It is known that there are branches of Linguistics called social Linguistics, divided into communicative Linguistics and media. Perhaps the best justification for the inclusion of a new curriculum in media studies is a semiotic analysis of the news. I›ve turned the speech, language and communication studies in relation to different disciplines, many research projects, and returned only old curriculum, speed shift in thought, proportional to the revolution in information and communication technology, for reality imposed on the entire world, researchers are the first affected by this enormous humanitarian Almanza. Alsimiaaeon still shy away from an
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show More