This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle curve is adopted to steer the vessel’s direction, while the cross-sections of the blood vessel are formed as a sequence of circles lying in planes that are orthogonal to the gradients of the middle curves. The radii for the circles are estimated as a distance between the intersection points of the blood vessel edges with the orthogonal plane to the middle curve gradient. The system then uses these circles and the middle curve gradients to produce a solid volume that represents the 3D shape of the blood vessel. The method was tested and evaluated using different cases of angiogram images, and showed a reasonable agreement between the generated shapes and the tested images.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreCharge transfer complex formation method has been applied for the spectrophotometric determination of cimetidine, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3-Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (5.0 - 50.0) µg.mL-1 with detection limit of 0.268µg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of cimetid
... Show MoreShear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity fr
... Show MoreRock failure during drilling is an important problem to be solved in petroleum technology. one of the most causes of rock failure is shale chemical interaction with drilling fluids. This interaction is changing the shale strength as well as its pore pressure relatively near the wellbore wall. In several oilfields in southern Iraq, drilling through the Tanuma formation is known as the most challenging operation due to its unstable behavior. Understanding the chemical reactions between shale and drilling fluid is determined by examining the features of shale and its behavior with drilling mud. Chemical interactions must be mitigated by the selection of suitable drilling mud with effective chemical additives. This study is describing t
... Show MoreThe article is devoted to the issue of word-formation motivation, which does not lose its relevance and plays a role not only in disclosing formal-semantic relations between words of one language and has not only theoretical, but also applied significance. The authors consider word-formation motivation consistently in its varieties in a comparative way on the materials of so different languages as Russian and Arabic and approach the mechanism of achieving semantic equivalence of translation. To the greatest extent, word-formation activity today, due to objective reasons, affects some special branch (technical, medical, etc.) vocabulary, which is increasing from year to year in national dictionaries. This extensive material, selected
... Show MoreIn many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relat
... Show More