Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the shape object image in Case 1 is relocated to the center of the image. In Case 3, the proposed method first detect the outer boundary of the shape object and then resizing the object to the boundary of the image. Experimental investigations were made by using two benchmark shape image datasets showed that the proposed method in Case 3 had demonstrated to provide the most superior image retrieval performances as compared to both the Case 1 and Case 2. As a conlusion, to fully capture the powerful shape representation properties of the Zernike moment, a shape object should be resized to the boundary of the image.
The anatomic characteristics of the leaves of 22 taxa of Stachys L. representing seven of the currently recognized sections distributed in northern Iraq, were examined. The study did not found any variations in the characteristics of the stomata system of the leaves.Therewere variations with a good taxonomic value in other anatomic characteristics.Thevariations in characters of the mesophyll tissue in S.kurdica var.brevidens Bom ex Bhattacharjeewas bifacial but in S.kurdica var.kurdica Boiss. & Hohen.was unifacial .The study also found that the taxa S.benthamiana Bioss., S.lanigera (Bornm.) Rech.f. andS.kotscyi Bioss. with 3 vascular bundles in the middle vein while the taxa S.ballotiformis Vatke., S.megalodonta Hausskn. &Bornm.exP.H.Davis
... Show MoreThe anatomic characteristics of the leaves of 22 taxa of Stachys L. representing seven of the currently recognized sections distributed in northern Iraq, were examined. The study did not found any variations in the characteristics of the stomata system of the leaves.Therewere variations with a good taxonomic value in other anatomic characteristics.Thevariations in characters of the mesophyll tissue in S.kurdica var.brevidens Bom ex Bhattacharjeewas bifacial but in S.kurdica var.kurdica Boiss. & Hohen.was unifacial .The study also found that the taxa S.benthamiana Bioss., S.lanigera (Bornm.) Rech.f. andS.kotscyi Bioss. with 3 vascular bundles in the middle vein while the taxa S.ballotiformis Vatke., S.megalodonta Hausskn. &Bo
... Show MoreThis research aims to test the causal relationship long-and short-run between the price of gold the global crude oil price and the exchange rate of the dollar and how you can take advantage of the nature of this relationship, particularly in the Arab oil states that achieve huge surpluses, including Iraq and how to keep on the purchasing power of these surpluses or reduce the levels of risk.
The problem is that the Arab oil countries, adversely affected, as a result of that relationship, due to the fact that its role confined to the sale of crude oil only. They do not have control in the dollar, then they are not able to take advantage of its impact on the price of gold the fact that gold is effective pr
... Show MoreThe sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample
... Show MoreBackground: Alveolar ridge expansion is proposed when the alveolar crest thickness is ≤5 mm. The screw expansion technique has been utilized for many years to expand narrow alveolar ridges. Recently, the osseodensification technique has been suggested as a reliable technique to expand narrow alveolar ridges with effective width gain and as little surgical operating time as possible. The current study aimed to compare osseodensification and screw expansion in terms of clinical width gain and operating time. Materials and methods: Forty implant osteotomies were performed in deficient horizontal alveolar ridges (3–5 mm). A total of 19 patients aged 21–59 years were randomized into two groups: the screw expansion group, which invo
... Show MoreFind cares studying ways in the development of industrial products and designs: the way the progressive development (how typical) and root development (jump design), was the aim of the research: to determine the effectiveness of the pattern and the jump in the development of designs and industrial products. After a process of analysis of a sample of research and two models of contemporary household electrical appliances, it was reached a set of findings and conclusions including:1-leaping designs changed a lot of entrenched perceptions of the user on how the product works and its use and the size and shape of the product, revealing him about the possibilities of sophisticated relationships with the product, while keeping the typical desi
... Show MoreIncremental forming is a flexible sheet metal forming process which is performed by utilizing simple tools to locally deform a sheet of metal along a predefined tool path without using of dies. This work presents the single point incremental forming process for producing pyramid geometry and studies the effect of tool geometry, tool diameter, and spindle speed on the residual stresses. The residual stresses were measured by ORIONRKS 6000 test measuring instrument. This instrument was used with four angles of (0º,15º,30º, and 45º) and the average value of residual stresses was determined, the value of the residual stress in the original blanks was (10.626 MPa). The X-ray diffraction technology was used to measure the residual stresses
... Show MoreThe aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T
... Show MoreFree Piston Engine Linear Generator (FPELG) is a modern engine and promising power generation engine. It has many advantages compared to conventional engines such as less friction, few numbers of parts, and high thermal efficiency. The cycle-to-cycle variation one of the big challenges of the FPELG because it is influence on the stability and output power of the engine. Therefore, in this study, the effect of ignition time on combustion characteristics is investigated. The single-cylinder FPELG with spark ignition (SI) combustion type by using compressed natural gas (CNG) fuel type was set to run. LabVIEW is used to run the engine and control of input parameters. All experimental data
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More