Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit based on shape analysis is presented. Color and shape analysis was utilized to segment the images of different fruits like apple, pomegranate obtained under different lighting conditions. First the input sectional tree image was converted from RGB colour space into the colour space transform (i.e., YUV, YIQ, or YCbCr). The resultant image was then applied to the algorithm for fruit segmentation. After it is applied Morphological Operations which is enhanced image then execute Blob counting method which identify the object and count the number of it. Accuracy of this algorithm used in this thesis is 82.21% for images that have been scanned.
The research addressed the formal functions resulting from the use of various guiding signs in the design of the interior spaces of airports in various pragmatic, expressive and psychological aspects. The aim is to identify the functions the guiding signs perform in facilitating and organizing the travelers' movement and satisfying the needs of the visitors and users of the unfamiliar places which they intend to visit, the nature of the services offered by these signs as one of the important parts within their general design. The research also identified the concept and types of signs as a means of visual communication and how to employ them in the design of the airports public spaces, and what are the criteria of their use and fu
... Show MoreIn this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.
Objective: to evaluate body image and depression symptoms of children with precocious puberty, and find out association between children`s sociodemographic characteristics and their body image and depression signs. Methodology: A cross sectional study, sample of (80) child from both gender, > 7 years were included due to their ability to express their own feeling, diagnosed with precocious puberty, attending out-patient endocrine clinics at pediatric hospitals in Baghdad city. Data collected, during the period from May to November 2018. Consent form has taken from children and their guardians to participate in study. Child body image scale (CBIS) was used to evaluate children body satisfaction (1) and Mood and feeling questionnaire (M
... Show MoreThe propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th
... Show MoreTransparent nano- coating was prepared by Sol-Gel method from titanium dioxide TiO2 which has the ability to self-cleaning coating used for hospitals, laboratories, and places requiring permanent sterilization. Three primary colors are selected (red, blue, and yellow) as preliminary study to the effect of these colors on the nano-coating. Three traditional oil paints color were used as base, then coated by a layer of TiO2-Sol and deposited on the paints. The optical properties of TiO2-Sol were measured; the maximum absorption wavelength at (λmax=387 nm), the refractive index (n=1.4423) and the energy band gap (Eg=3.2 eV). The structure properties found by X-ray diffraction of TiO
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
The purchase of a home and access to housing is one of the most important requirements for the life of the individual and the stability of living and the development of the prices of houses in general and in Baghdad in particular affected by several factors, including the basic area of the house, the age of the house, the neighborhood in which the housing is available and the basic services, Where the statistical model SSM model was used to model house prices over a period of time from 2000 to 2018 and forecast until 2025 The research is concerned with enhancing the importance of this model and describing it as a standard and important compared to the models used in the analysis of time series after obtaining the
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.