This paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate injury, this difference may be tooth decay or a broken bone , cancerous cells or infected gums, The X-OR gate is the best gates uses in this technique. Simulation program using visual basic has been in order to determine final results.
Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.
LandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.
In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
Logic is one of the sciences that have receded and regressed in the field of Islamic sciences. This regression is the result of several factors, the most important of which are:
1- The Aristotelian logic, concerned with the seemingly essential shape and the underlying truth in the text, which has been translated into Arabic, is no longer able to keep pace with scientific revelations and epistemological spaces of our time.
2- The existence of logic in the curricula of Islamic studies was not subject to a study linking logic and Islamic sciences. Therefore, we find that the student studies logic as if it were a strange subject that has nothing to do with the subjects of Islamic studies and even Islamic philosophy.
3- Logic is
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.
Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
In this search, a new bioluminescent technique was proved for pyrophosphate which was employed to single- nucleotide polymorphism (SNP) diagnosis using one-base extension reaction. Four Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG, GyrA) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad., also one specimen was used as a negative control. The procedure of this assay was as follows. A specific primer within each aliquot owning a short 3-OH end of the base of the target gene was hybridized to the single-stranded DNA template. Then, (exo-) Klenow DNA polymerase and one of either ?-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreRecent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste