The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Most researchers concentrate their studies on the design, stress and pressure distributions of the prosthetic socket. A little attention is considered for the stiffness of the various materials of the prosthetic sockets. Prosthetic laminated sockets in Iraq are costly to be manufactured while polypropylene socket is relatively cheap in comparing with the laminates.
Experimental study is conducted to compare the stiffness of five prosthetic sockets made of different materials. Compression, three point flexural and tensile tests are implemented by the Testometric machine. The laminate sockets give better results in compression than polypropylene. Polypropylene gives good results in bending compared with the laminate sockets. When t
... Show MoreThis paper examines the most important historical knowledge and knowledge of the Arabs in the pre-Islamic era based on the Holy Quran, which is the oldest and most reliable Arab Islamic sources recorded at all, as a major source of this study, to ensure a great interest in history, especially the news of the prophets, and the positions of their nations Some of them, as well as some of the news of the old Arab people such as Aad and Thamud and the owners of the elephant and others, and some of which are repeated in several Quranic fence and various methods of presentation, cited as a lesson and exhortation to the Arab opponents of Islam and a reminder of what befell the peoples of the world B relict of doom to discredit them the apostles
... Show MoreIntegrated reservoir rock typing in carbonate reservoirs is a significant step in reservoir modelling. The key purpose of this study is the identification of integrated rock types in the Sarvak Formation of an Iranian oilfield. In this study, electrofacies (EFAC) analysis of the Sarvak reservoir was done in detail to determine the reservoir quality and rock types of the Sarvak Formation in the studied field. The core data and conventional petrophysical logs were used for rock typing. Some petrophysical logs such as porosity, sonic, neutron, density, and Photo electric factor were applied as input data for electrofacies analysis. Multi-Resolution Graph-Based Clustering was used among six approaches, resulting in four electrofacies af
... Show MoreThe need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to
... Show MoreThe research aims to answer some of the fundamental questions posed by the contexts used and assumed for the criticism of poetry from the cultural anthropological perspective in the field of genealogy in Andalusia, as available from the remaining literature in this humanitarian field. Criticism, the varieties of its outputs, and the reasons behind it, which came in its entirety as a critical link in the critical heritage chain, did not create separation as much as we wanted to shed light on them from their sources, and from the atmosphere that resulted.
The research (The Aesthetics of Lumia Art in Contemporary Textile Arts: An Analytical Study) included four chapters, the first to explain the research problem summarized by the question: Does the art of Lumia achieve aesthetic values in contemporary textile arts?, and aims to: Identify the aesthetics of Lumia art and its applied uses in contemporary textile arts, within the time period (2013-2022). The third chapter included: research procedures and sample analysis (4) models according to the descriptive analytical approach, and the fourth chapter dealt with: results, conclusions and recommendations as well as sources.
Objective: determine the effectiveness of an education program on youth's level of awareness towards
household waste control.
Methodology: A Quazi-experimental study was conducted. Non-probability (quota sample) of (80) young
persons is selected from Baghdad Governorate. They are divided into two equal groups of (40) subjects for the
study group which is exposed to the household waste control educational program. The remaining is the
control group which is not exposed to the educational program.
Results: The findings of the study indicated that youth of the study group have got benefits from the
implementation of the educational program towards household waste control and change has occurred to
their awareness tow
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More