Classifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area. The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and overlapping kitchen utensils from internet were used as base benchmark objects. The evaluation and training/validation sets are set at 20% and 80% respectively. This project evaluated the performance of these techniques and analyzed their strengths and speeds based on accuracy, precision and F1 score. The analysis results in this project concluded that the YOLOv5 produces accurate bounding boxes whereas the Faster R-CNN detects more objects. In an identical testing environment, YOLOv5 shows the better performance than Faster R-CNN algorithm. After running in the same environment, this project gained the accuracy of 0.8912(89.12%) for YOLOv5 and 0.8392 (83.92%) for Faster R-CNN, while the loss value was 0.1852 for YOLOv5 and 0.2166 for Faster R-CNN. The comparison of these two methods is most current and never been applied in overlapping objects, especially kitchen utensils.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t
... Show MoreAim of the study: Using surface roughness and tensile bond strength tests, the objective of this investigation was to ascertain the impact of laser surface modification on the binding strength of injectable thermoplastic acrylic denture base material to acrylic-based soft-liner material. Materials and methods: Acrylic base soft liner material was bonded to injectable thermoplastic acrylic resin (Deflex). Forty specimens were created (20 disc, 20 dumbbells) 10 of each specimen type as control specimens, and 10 were treated with nano pulse Nd: YAG laser. The data were analyzed using the Kruskal-Wallis test and unpaired t-test (a=.05) and the roughness test was performed utilizing a double column universal test machine. Results: Compar
... Show MoreGlutathione S-transferases (GSTs) are enzymes that included, in a more range of detoxifying reactions by conjugation of glutathione, to electrophilic material. Polymorphisms n the genes that responsible of GSTs affect, the function of the GSTs. GSTs play an active role in protection of cell against oxidative stress mechanism. Polymorphisms of GSTP1 at codon 105 amino acids forms GSTP1 important site for bind of hydrophobic electrophiles and the substitution of Ile/Val affect substrate specially catalytic activity of the enzyme and may correlate with reach to different diseases in human like diabetes mellitus type2 disease. Correlation between these polymorphisms and changes in the parameters file of diabetic patients has also bee
... Show MorePolynomial IIR digital filters play a crucial role in the process of image data compression. The main purpose of designing polynomial IIR digital filters of the integer parameters space and introduce efficient filters to compress image data using a singular value decomposition algorithm. The proposed work is designed to break down the complex topic into bite-sized pieces of image data compression through the lens of compression image data using Infinite Impulse Response Filters. The frequency response of the filters is measured using a real signal with an automated panoramic measuring system developed in the virtual instrument environment. The analysis of the output signal showed that there are no limit cycles with a maximum radius
... Show MoreFour major factories (Petroleum Refineries Company, Detergents Plant, Thermal Power Plant, and Gaseous Power Plant) are located to the north of Baiji City. They release pollutants in form of gases, liquids and solids; they find their way to the surrounding environment. To assess the environmental pollution of the area, 18 samples of surface soil distributed around the industrial establishments were collected and analyzed to determine the concentration of polycyclic aromatic hydrocarbons (PAH) components which are often targets in the environmental checking. Identification and quantification of the 16 PAHs components was accomplished using High Performance Liquid Chromatography (HPLC) had a model Shimadzu LC-10 AVP. The total concentratio
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.