<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
A theoretical study has been proposed to investigate the effects of different laser radiations (Nd - glass, DF and C02) as a heating source on different glass samples (Optical glass, Bk - 7 and Soda - lime glass) and different waves lengths (10.6, 3.8, 1.6) ???. The heat changes as which are resulted due irradiation with laser sources have been determined by using the one dimension mathematical relation as a function of time (t) and depth (z). The results of the study show ed that the irradiation with C02 laser had a greater effect than DF laser, while the effects of Nd - glass laser were minimal with a power density of (1.8*10?? w/m2) within atime(l^sec).(Forboth Kinds) The change in the temperatures were not exceeded than (70"K) in all sa
... Show MoreThis field experiment, was conducted to investigate a comparison of two methods for harvesting potatoes: mechanical and handy when using moldboard and chisel plow for primary tillage and three different distances for planting tubers in the rows 15, 25, and 35 cm in silt clay loam soil south of Baghdad. The factorial experiment followed a randomized complete block design with three replications using L.S.D. 5 % and 1 %. Mechanical harvest recorded the best valid potato tubers at 88.78 %, marketable yield of 31.74 ton. ha-1, efficiency lifted 95.68 %, tubers damage index 28.41, speeding up the harvesting process and reducing time and effort. Handy harvest gave the least damage to potato tubers, 6.02 %, and unlifted potato tubers, 4.32 %. Howe
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreReading roles as the third skill in the range of English as a Foreign Language (EFL) learning. Although the capability of reading in both academic and non-academic texts is assessed on standardized tests, few of oral interpretation of written language excludes images from estimating literary knowledge. This paper highlights strategies of reading comprehension and visual literacy. It aims to investigate either textual or visual reading in EFL can make an impact on students' comprehension. The effective use of visuals changes instructing reading comprehension recently.The imagery-text model can affect developing reading comprehension and enhancing intellectual thinking. The study hypothesizes that there is no relationship between reading and
... Show MoreSKF Sami I. Jafar, Mohammad J. Kadhim, Engineering and Technology Journal, 2018 - Cited by 4
In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
In this paper, the class of meromorphic multivalent functions of the form by using fractional differ-integral operators is introduced. We get Coefficients estimates, radii of convexity and star likeness. Also closure theorems and distortion theorem for the class , is calculaed.
This study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat
... Show More