The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreAbstract-Industrial and urban development has resulted in the spread of plastic waste and the increase in the emissions of carbon dioxide resulting from the cement manufacturing process. The current research aims to produce green (environmentally friendly) concrete by using plastic waste as coarse aggregates in different proportions (10% and 20%) and nano silica sand powder as an alternative to cement in different proportions (5% and 10% by weight). The results showed that compressive strength decreased by 12.10% and 19.23% for 10% and 20% plastic waste replacement and increased by 12.89% and 20.39% for 5% and 10% silica sand replacement respectively at 28 days. Flexural strength decreased by 12.95% and 19.64% for 10% and 20% plastic waste
... Show MoreA variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u
... Show MoreIntestinal mucositis is referring to inflammatory or ulcerative lesions of the oral or gastrointestinal tract; one of the main reasons is treatment with cancer chemotherapy. The prodrug Irinotecan is converted by carboxylesterase to the active metabolite SN-38, conjugated by UGT enzyme to SN-38G and then deconjugated by ?-glucoronidase produced by intestinal bacterial flora to produce SN-38. Irinotecan induces intestinal mucositis and diarrhea due to increased concentration of its active metabolite (SN-38).To evaluate the protective effect of carvone, I.P injection of (75mg/kg/day) of irinotecan for 4 days to induce intestinal mucositis, carvone administered to mice orally for 6 days starting from day 1. Results showed that carvone (50mg
... Show MoreAbstract
This paper presents mechanical and electrical design, and implementation process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThis study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot
... Show More