Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show MoreA nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.
Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreSheikh Hanafi was born in one of the popular shops of Baghdad with interlocking social relations, and had a profound impact this camp where his talents in the first Venco loving to Mahalah and Baghdad and was born with this development since his days looked forward to the folklore and folk. In the middle of his youth, including authoring loves the heritage of folk legacies began in motion, from Baghdad, books, articles, research has brought him wide acclaim were not possible without the seriousness and diligence, independence and self-Asamath that mushroom on them
The trip was one of his tools in the scientific fame has gone to many Eastern and Asian countries and visited religious and literary institutes and delivered the lectures an
In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreThe mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th
... Show MoreBackground: An accurate adaptation of the crown to the finish line is essential to minimize cement dissolution and to preserve periodontium in fixed partial denture cases. An accurate adaptation of crown is possible only when preparation details are captured adequately in the impression and transferred to cast. For these reasons, gingival displacement is necessary to capture subgingival preparation details.The aim of the present study is to measure in vivo the horizontal displacement of the gingival sulcus obtained by using three new cordless retraction materials (Magic Foam Cord®, Racegel and Astringent Retraction Paste) in comparison to medicated retraction cord. Materials and method: Thirty-two patients requiring porcelain fused to me
... Show MoreBackground: The roles of AI in the academic community continue to grow, especially in the enhancement of learning outcomes and the improvement of writing quality and efficiency. Objectives: To explore in depth the experience of senior pharmacy students in using artificial intelligence for academic purposes. Methods: This qualitative study included face-to-face individual interviews with senior pharmacy students from March to May 2023 using a pre-planned interview guide of open-ended questions. All interviews were audio-recorded. Thematic analysis was used to analyze the data. Results: The results were obtained from 15 in-depth face-to-face interviews with senior pharmacy students (5th and 4th years). Eight participants were male, and seven
... Show More