The aim of this work, is to study color filming by using different intensities of fluorescent light, where we evaluate the capture image qualities for the RGB bands and component of L. And we study the relation between the means of RGBL values of the images as a function of the power of fluorescent light circuit . From the results, we show that the mean μ increases rapidly at low power values, then it will reach the stability at high power values.
ABSTRACT Background:- White spot lesions are common esthetic problem that compromise the success of orthodontic treatment. This study aimed to assess white spot lesions in patients with fixed orthodontic appliance at different time intervals. Materials & Methods:- Thirty two patients (24 females and 8 males) were included in this study and they underwent clinical examination for white spot lesions using enamel decalcification index at four time intervals: (2-3 weeks after appliance insertion, 2, 4 and 6 months). Results:- The patients were free of white spot lesions at the appliance insertion visit. The mean of white spot lesions was 2.22 which were increased significantly during six months to reach 24.59 at the end of study. There was a si
... Show MoreGross domestic product (GDP) is an important measure of the size of the economy's production. Economists use this term to determine the extent of decline and growth in the economies of countries. It is also used to determine the order of countries and compare them to each other. The research aims at describing and analyzing the GDP during the period from 1980 to 2015 and for the public and private sectors and then forecasting GDP in subsequent years until 2025. To achieve this goal, two methods were used: linear and nonlinear regression. The second method in the time series analysis of the Box-Jenkins models and the using of statistical package (Minitab17), (GRETLW32)) to extract the results, and then comparing the two methods, T
... Show MoreThe mechanical properties of fiber-reinforced-polymer (FRP)
composites are dependent on the type amount, and orientation of fiber that is selected for a particular service. There are many commercially available reinforcement forms to meet the design requirements of the user. The ability of failure in the fiber architecture allows for optimized performance of a product that saves both weight and cost ( 12).
A modem technology is adopted to produce fibers (glass, kevelar,
and carbon) reinforced composite by using unsaturated polyester, where different volume fraction of these fibers are used (0, 0.2, 0.4, 0.6, 0.8, I)
reinfor
... Show MoreOne of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first
... Show MoreIdentifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit
... Show MoreFace detection systems are based on the assumption that each individual has a unique face structure and that computerized face matching is possible using facial symmetry. Face recognition technology has been employed for security purposes in many organizations and businesses throughout the world. This research examines the classifications in machine learning approaches using feature extraction for the facial image detection system. Due to its high level of accuracy and speed, the Viola-Jones method is utilized for facial detection using the MUCT database. The LDA feature extraction method is applied as an input to three algorithms of machine learning approaches, which are the J48, OneR, and JRip classifiers. The experiment’s
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More