The semiempirical (PM3) and DFT quantum mechanical methods were used to investigate the theoretical degradation of Indigo dye. The chemical reactivity of the Indigo dye was evaluated by comparing the potential energy stability of the mean bonds. Seven transition states were suggested and studied to estimate the actually starting step of the degradation reaction. The bond length and bond angle calculations indicate that the best active site in the Indigo dye molecule is at C10=C11. The most possible transition states are examined for all suggested paths of Indigo dye degradation predicated on zero-point energy and imaginary frequency. The first starting step of the reaction mechanism is proposed. The change in enthalpy, Gibbs free energy and change in entropy of the overall reaction are equal to -548268.223 kcal/mol, 30831.951 kcal/mol and 48.552 cal/mol.deg, respectively. The activation energy is 46176.405 kcal/mol. The reaction rate is equal to .
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show Morecapable of the measuring with a high degree of precision in a single instrument. Total stations device are used for station setting up, setting-outmany points from one station. Their major purpose of this work is to take advantage of total station for setting up building and to establish 3D representation using AutoCAD program. The area of the study was Civil Engineering Department at Baghdad University campus AL Jadiriyah. The completion of the work is done in two stages; 1. The field work: In this stage, the Total Station Nikon Nivo-5C was selected for the current study. This device was measured horizontal and vertical distance, elevations, and coordinates from a single set up. This data directly stored on memory. 2. The office work: In t
... Show MoreStress urinary incontinence (SUI) is involuntary urine leakage during activities that increase abdominal pressure such as coughing, sneezing and lifting of heavy weights. This is a very common disorder among women with history of multiple vaginal deliveries with an obstructed labor. SUI is considered one of the most distressing problems, especially for younger women, with severe quality of life implications, it caused by the loss of urethral support, usually as a consequence of the supporting structural muscles in the pelvis.
Objective: To prove and demonstrate the effect of a fractional CO2 micro-ablative laser (10600nm) in intra vaginal therapy for treating SUI and achieve a clinical improvement of t
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show More