Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of artefacts in virtual restoration is presented based on reverse engineering techniques. Two case studies were selected and processed in Iraq to meet the aim of this research and show how reverse engineering approaches can save our culture. The efficiency and safety of the preservation and restoration of cultural relics are improved and visually demonstrated. Different reverse engineering techniques applied to show the geometric potential for such approaches following laser-based 3D data application.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of
... Show MoreThe accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.
<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreChurning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show MoreA new set of metal complexes by the general formula [M(P)2(H2O)2]Cl2 has been prepared through the interaction of the new Ligand [N1, N4-bis(4-methoxyphenyl)succinamide] (P) derived from succinyl chloride with p-anisidine with the transition metal ions [Cu(II), Mn(II), Cd(II), Co(II) and Ni(II)]. Compounds diagnosed by TGA, 1 H, 13CNMR and Mass spectra (for (P)), Fourier-transform infrared and Electronic spectrum, Magnetic measurement, molar conduct, (%M, %C, %H, %N). These measurements indicate that (P) is associated with the metal ion in a bi-dentate fashion by nitrogen atoms (the amide group), and the octahedral composition of these complexes is suggested. Staphylococcus Aureus (+) and Escherichia Coli (–) were studied for the antibact
... Show MoreIn this research , phthallic anhydride ring is opened with 4-methyl aniline and acetone as a solvent to results the compound [I] that reacted with dimethyl sulphate and anhydrous sodium carbonate formation to phathalate ester [II], while the acid hydrazide compound [III], was obtained from mixed the compound [II]with hydrazine hydrate, Synthesis four type of shiff bases[IV]a-d was synthesized from the reaction of acid hydrazide [III] with aromatic aldehyde or ketone , when reacted Shiff bases with phthalic anhydride or naphthalicanhydride,I get eight derivatives of oxazepine [V]a-d , [VI]a-d. The bacterial activity of the new compounds studied by four species of bacteria: Esherichia Coli, Enterobactecloacae (Gram negative) and staphylococcu
... Show More