The reality of the field of construction projects in Iraq refers to needing for the development of performance in order to improve quality and reduce defects and errors and to control the time and cost, so there is needing for the application of effective methods in this area, one of the methods that can be applied in this area is the manner of Six Sigma. This research aims to enhance the performance and quality improvement for the construction projects by improving performance in the work of the implementation of the concrete structure depending on the Six Sigma methodology, and for the purpose of achieving the aim of the research, the researcher firstly depends on the theoretical study that include the concepts of qual
... Show MoreCataract is an opacity in the normally transparent focusing lens of the eye which leads to blindness. The aim of current study is to investigate the possible protective and therapeutic effects of aqueous extract of Foeniculum vulgare seed eye drops (0.5%) against selenite induced cataract in rabbits. Aqueous extract of Foeniculum vulgare seed prepared then formulated as eye drops. Sodium selenite used to induce cataract in rabbits' right eye by single intravitreal injection. Thirty-six rabbits included in the study and divided into three equal groups (12 rabbits in each group): healthy control group, Cataract-Induced group and group treated by Foeniculum vulgare seed extract eye drops. Parameters include the score of lens opacity which was
... Show MoreTo compare the corneal epithelial thickness profile in patients with dry eyes and keratoconus suspect with normal healthy eyes.
The study involved 120 eyes with an age range from 19 to 30 years. Forty eyes had normal corneal topography and no dry eyes. Forty eyes had dry eyes but had normal corneal topography. The last 40 eyes were keratoconus suspect and had no symptoms or signs of dry eyes.
Central epithelial thickness was not different statistically for all eyes. ( p-value: 0.1). The superior epithelial thickness was 53.5 µm ±3.1 in the control
Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More