Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of artefacts in virtual restoration is presented based on reverse engineering techniques. Two case studies were selected and processed in Iraq to meet the aim of this research and show how reverse engineering approaches can save our culture. The efficiency and safety of the preservation and restoration of cultural relics are improved and visually demonstrated. Different reverse engineering techniques applied to show the geometric potential for such approaches following laser-based 3D data application.
In this investigation, water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals), utilizing N-acetyl cysteine as a stabilizer, were prepared to assess their potential in differentiating between DNA extracted from pathogenic bacteria (e.g. Escherichia coli isolated from urine specimen) and intact DNA (extracted from blood of healthy individuals) for biomedical sensing prospective. Following the optical characterization of the synthesized QDs, the XRD analysis illustrated the construction of NAC-CdTe-QDs with a grain size of 7.1 nm. The prepared NAC-CdTe-QDs exhibited higher PL emission features at of 550 nm and UV-Vis absorption peak at 300 nm. Additionally, the energy gap quantified via PL and UV–Vis were 2.2 eV
... Show MoreBiped robots have gained much attention for decades. A variety of researches have been conducted to make them able to assist or even substitute for humans in performing special tasks. In addition, studying biped robots is important in order to understand human locomotion and to develop and improve control strategies for prosthetic and orthotic limbs. This paper discusses the main challenges encountered in the design of biped robots, such as modeling, stability and their walking patterns. The subject is difficult to deal with because the biped mechanism intervenes with mechanics, control, electronics and artificial intelligence. In this paper, we collect and introduce a systematic discussion of modelin
Objective: The purpose of this study was to determine the association between caries related microorganisms in children’s saliva, such as Streptococcus mutans and lactobacilli, and their demographic factors. Methods: This study involved a sample of 135, both sexes with an age range between 3 and 10 years. Unstimulated saliva was obtained and diluted in normal saline. Saliva was then placed in selective media. Salivaris agar was used for mutans streptococci while Rogosa agar for lactobacilli. After incubation, Streptococcus mutans counting of CFU (colony forming units) with morphology characterization and numbers of CFU per milliliter of saliva for lactobacilli. Demographic factors information was collected using a questionnaire.
... Show MoreBackground: Nursing interventions tailored to the smoking triggers in patients with non-communicable chronic diseases are essential. However, these interventions are scant due to the nature of factors associated with smoking cessation and the poor understanding of the effect of nurse-led intervention in Iraq.Purpose: This study aimed to determine the dominant smoking triggers and examine the effects of a tailored nursing intervention on smoking behavior in patients with non-communicable chronic diseases.Methods: Convenience samples of 128 patients with non-communicable chronic diseases, male and female patients, who were 18-70 years old, were recruited in this quasi-experimental, randomized comparative trial in the outpatient clinic
... Show MoreIn this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcat
... Show MoreAbstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19