The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present study proposes the use of a hybrid image segmentation technique to acquire precise segmentation outcomes, while engaging “Alpha Shape (α-Shape)” in supposition to derive the original contour, followed by a refining process through engaging a conventional active contour model. Empirical results show high potential in the suggested computational method. Trials indicate that the primary contour is capable of being precisely set next to the objective contour and effectively have these objective contours extracted, devoid of any contour instigation. Some of the benefits associated with the novel hybrid contour include minimized cost of computation, enhanced anti-jamming capability, as well as enlarged utilization array of snake model.
The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore, the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of the mobile network and its wide usage through different types of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat
... Show MoreNatural convection heat transfer is experimentally investigated for laminar air flow in a vertical circular tube by using the boundary condition of constant wall heat flux in the ranges of (RaL) from (1.1*109) to (4.7*109). The experimental set-up was designed for determining the effect of different types of restrictions placed at entry of heated tube in bottom position, on the surface temperature distribution and on the local and average heat transfer coefficients. The apparatus was made with an electrically heated cylinder of a length (900mm) and diameter (30mm). The entry restrictions were included a circular tube of same diameter as the heated cylinder but with lengths of (60cm, 120cm), sharp-edge and
... Show MoreFocusing of Gaussian laser beam through nonlinear media can induce spatial self- phase modulation which forms a far field intensity pattern of concentric rings. The nonlinear refractive index change of material depends on the number of pattern rings. In this paper, a formation of tunable nonlinear refractive index change of hybrid functionalized carbon nanotubes/silver nanoparticles acetone suspensions (F-MWCNTs/Ag-NPs) at weight mixing ratio of 1:3 and volume fraction of 6x10-6 , 9x10-6 , and 18x10-6 using laser beam at wavelength of 473nm was investigated experimentally. The results showed that tunable nonlinear refractive indices were obtained and increasing of incident laser power density led to increase the nonlinear refractive inde
... Show MoreAs modern radiotherapy technology advances, radiation dose and dose distribution have improved significantly. As part of a natural evolution, there has recently been renewed interest in therapy, particularly in the use of heavy charged particles, because these types of radiation serve theoretical advantages in all biological and physical aspects. The interactions of alpha particle with matter were studied and the stopping powers of alpha particle with Breast Tissue were calculated by using Beth-Bloch equation, Zeigler's formula and SRIM software, also the Range and Liner Energy Transfer (LET) and Breast Thickness As well as Dose and Dose equivalent for this particle were calculated by using Mat lab language for (0.01-200) MeV alpha ene
... Show MoreCu-Al-Ni shape memory alloy specimens has been fabricated using powder metallurgy technique with tube furnace and vacuum sintering environment , three range of Nb powder weight percentage (0.3,0.6,0.9)% has been added. Micro hardness and sliding wear resist has been tested followed by X-ray diffraction, scanning electron microscope (SEM) and energy dispersive X-ray spectroscope (EDX) for micro structure observation. The experimental test for the samples has showed that the increase of Nb powder weight percentage in the master alloy has a significant effect on increasing the hardness and decreasing the wear resist therefore it will enhance the mechanical properties for this alloy.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreIn this work, the circular patch antenna was fabricated and analyzed. Microwave Studio (version 2019) computer simulation technology (CST) was used to design the circular patch antenna. The material FR-4 was used to build this antenna, using the computer numerical control (CNC) method to implement this work. For the purpose of accomplishing this design, the values of the resonant frequency, dielectric constant and dielectric thickness of the material used as in 4.424, 2.4 GHz and 0.159 cm respectively were used as inputs to the CST program to get the said program outputs for the required antenna radius with the logarithmic function (F) of the circular patch antenna 1.6909 cm and 1.7415 cm respectively. Practically, the b
... Show More