The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
In this paper we prove a theorem about the existence and uniqueness common fixed point for two uncommenting self-mappings which defined on orbitally complete G-metric space. Where we use a general contraction condition.
Objectives: To identify child or family related risk factors for
unintentional childhood poisoning in Sulaymaniyah, Iraq and to suggest
possible causes and preventive measures.
Methods: This is an epidemiological description and a case-control study. The study was undertaken in Sulaymani ,in 2004-2005. Cases were 200 children who were admitted to the hospital for treatment of poisoning. For every case two controls were selected. Al l parents of the children were interviewed by using a questionnaire that incl uded demographic and poisoning characteristic information.<
... Show MoreThe set of all (n×n) non-singular matrices over the field F. And this set forms a group under the operation of matrix multiplication. This group is called the general linear group of dimension over the field F, denoted by . The determinant of these matrices is a homomorphism from into F* and the kernel of this homomorphism was the special linear group and denoted by Thus is the subgroup of which contains all matrices of determinant one.
The rationally valued characters of the rational representations are written as a linear combination of the induced characters for the groups discussed in this paper. We find the Artin indicator for this group after studying the rationally valued characters of the rational
... Show MoreThis model is an extension to H.M.M.S and related developments models of a single product. These models will be converted to deal with Multiproduct for productive company. This model executed by computer programming technique to maximize profits
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreNahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a
... Show More