Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit
... Show MoreThree-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Solid dispersion (SD) is one of the most widely used methods to resolve issues accompanied by poorly soluble drugs. The present study was carried out to enhance the solubility and dissolution rate of Aceclofenac (ACE), a BCS class II drug with pH-dependent solubility, by the SD method. Effervescent assisted fusion technique (EFSD) using different hydrophilic carriers (mannitol, urea, Soluplus®, poloxamer 188, and poloxamer 407) in the presence of an effervescent base (sodium bicarbonate and citric acid) in different drug: carrier: effervescent base ratio and the conventional fusion technique (FSD) were used to prepare ACE SD. Solubility, dissolution rate, Fourier transformation infrared spectroscopy (FTIR), PowderX-ray diffraction
... Show MoreThe conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy
... Show MoreThis article discusses a discussion of trends and patterns of understanding and application of the concept of metaphor to various subjects that may interfere with the perspective of metaphors in translation theory, an attempt was made to use the principles and characteristics of metaphors and their fundamental tradition in translation theory, and to uncover the perspective of considering metaphor as a conceptual process. presenting its merits, since it is still considered an eccentric expression of linguistics.