Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the shape object image in Case 1 is relocated to the center of the image. In Case 3, the proposed method first detect the outer boundary of the shape object and then resizing the object to the boundary of the image. Experimental investigations were made by using two benchmark shape image datasets showed that the proposed method in Case 3 had demonstrated to provide the most superior image retrieval performances as compared to both the Case 1 and Case 2. As a conlusion, to fully capture the powerful shape representation properties of the Zernike moment, a shape object should be resized to the boundary of the image.
Shiranish Formation (Late Campanian- Maastrichtian) that cropping out north east Iraq, is studied by microfacies analysis of 52 thin section collected from Hijran Section, about 10 km west Shaqlawa Town, Governorate of Erbil. According to petrography, mineralogy and organic contents, rocks are subdivided to crystalline carbonate and microfacies units (biowackstone, packstone, and mudstone facies). Biowackstone facies have high ratio of the rock components, while the other facies have low ratio. Microfacies analysis led to relatively quiet deep marine environment.
The present study focused mainly on the vibration analysis of composite laminated plates subjected to
thermal and mechanical loads or without any load (free vibration). Natural frequency and dynamic
response are analyzed by analytical, numerical and experimental analysis (by using impact hammer) for
different cases. The experimental investigation is to manufacture the laminates and to find mechanical
and thermal properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus,
longitudinal and transverse thermal expansion and thermal conductivity. The vibration test carried to
find the three natural frequencies of plate. The design parameters of the laminates such as aspect ratio,
thickness
Oral carcinoma is the 6th most common cancer in the world. MicroRNAs are small non-coding single stranded RNAs. They have been shown to be capable of altering mRNA expression; thus some are oncogenic or tumor suppressive in nature. The salivary microRNA-31 has been proposed as a sensitive marker for oral malignancy since it was abundant in saliva more than in plasma. A total of 55 whole saliva samples were collected from 35 cases diagnosed with OC their ages and gender matched with 20 healthy subjects. TaqManq RT-PCR was performed for RNA samples. Mean age was 52.23+13.73 years in cases (range:17-70 years) with male predominance represented 69%. Risk of smoking and alcoholism was highly significant. The median fold change of miR-31 was sign
... Show MoreRM Abbas, AA Abdulhameed, AI Salahaldin, International Conference on Geotechnical Engineering, 2010
Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreMycobacterium tuberculosis resistance to rifampicin is mainly mediated through mutations in the rpoB gene. The effects of rpoB mutations are relieved by secondary mutations in rpoA or rpoC genes. This study aims to identify mutations in rpoB, rpoA, and rpoC genes of Mycobacterium tuberculosis isolates and clarify their contribution to rifampicin resistance. Seventy isolates were identified by acid-fast bacilli smear, Genexpert assay, and growth on Lowenstein Jensen medium. Drug susceptibility, testing was performed by the proportional method. DNA extraction, PCR, and sequencing were accomplished for the entire rpoA, rpoB, and
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More