Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the shape object image in Case 1 is relocated to the center of the image. In Case 3, the proposed method first detect the outer boundary of the shape object and then resizing the object to the boundary of the image. Experimental investigations were made by using two benchmark shape image datasets showed that the proposed method in Case 3 had demonstrated to provide the most superior image retrieval performances as compared to both the Case 1 and Case 2. As a conlusion, to fully capture the powerful shape representation properties of the Zernike moment, a shape object should be resized to the boundary of the image.
Background: The aim of this in vitro study was to evaluate and compare the effect of preheating microleakage among three different filler size composites which include Filtektm Z250 micro hybrid, Z250xt Nano hybrid and nanocomposite Z350xt. in Class II cavity preparation .
Materials and methods: sixty maxillary first premolars were prepared with class II cavities. Samples were divided into three groups according to material used group A (FiltekZ250 micro hybrid). Group B(Z250xt Nano hybrid). Group C (nanocomposite Z350xt)and each group divided into two subgroups of ten teeth according to temperature of composite:
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show MoreThe comparative method plays a major role in Maupassant’s novel (A woman’s Life).This is due to a good theme choice and smooth writing style characterized by simplicity, spontaneity and brevity.
The author uses the comparative method in the introduction of his novel where he compares the monastery’s closed world to the open world of the countryside of La Normandie, which represents the dream life of the heroine Jeanne.
The present paper is an attempt to answer the question regarding the importance of applying the comparative method in the novel (A Woman’s Life) by Maupassant. The paper stresses the fact that the novelist employs the comparative method in his book for certain features .One of these features is the
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreSingle-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor Q Configuration is proposed. This paper discusses a new configuration to realize third-order low pass, band pass and high pass. The presented circuit uses Single-input Multiple-output signals, OP-AMP and passive components. This filter is useful for high frequency operation, monolithic IC implementation and it is easy to design .This circuit gives three filter functions low-pass, high-pass and band-pass. This filter circuit can be used for different merit factor (Q) with high pass band gain. This gives better stop-band attenuation and sharper cut-off at the edge of the pass-band. Thus the response shows wider pass-band. The Ideal value of thi
... Show MoreIn this paper, the researchers investigate Prime Minister Benjamin Netanyahu's speech before a joint session of the US Congress on July 25, 2024. The researchers primarily aim at highlighting the ideology behind Netanyahu's speech by using qualitative research through the application of critical discourse analysis (CDA), which is employed here in in order to show how certain linguistic choices can manipulate and determine concepts related to power and ideology. The CDA method used is Discourse Historical Approach with the main focus on argumentation management through discursive strategies. The researchers adopt DHA by Wodak (2009) with focusing on the taxonomy of social actor representation by Van Leeuwen (2008). The study reveals th
... Show MoreMagic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .
Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th
... Show MoreThe research is concerned with studying the characteristics of Sustainable Architecture and Green Architecture, as a general research methodology related to the specific field of architecture, based on the differentiation between two generic concepts, Sustainability and Greening, to form the framework of the research specific methodology, where both concepts seem to be extremely overlapping for research centers, individuals, and relevant organizations. In this regard, the research tend towards searching their characteristics and to clearly differentiates between the two terms, particularly in architecture, where the research seeks understanding sustainable and green architectures, how they are so close or so far, and the
... Show MoreThis research is devoted to investigating the thermal buckling analysis behaviour of laminated composite plates subjected to uniform and non-uniform temperature fields by applying an analytical model based on a refined plate theory (RPT) with five unknown independent variables. The theory accounts for the parabolic distribution of the transverse shear strains through the plate thickness and satisfies the zero-traction boundary condition on the surface without using shear correction factors; hence a shear correction factor is not required. The governing differential equations and associated boundary conditions are derived by using the virtual work principle and solved via Navier-type analytical procedure to obtain critica
... Show More