Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
The ground state charge, neutron, proton and matter densities, the associated nuclear radii and the binding energy per nucleon of 8B, 17Ne, 23Al and 27P halo nuclei have been investigated using the Skyrme–Hartree–Fock (SHF) model with the new SKxs25 parameters. According to the calculated results, it is found that the SHF model with these Skyrme parameters provides a good description on the nuclear structure of above proton-rich halo nuclei. The elastic charge form factors of 8B and 17Ne halo nuclei and those of their stable isotopes 10B and 20Ne are calculated using plane-wave Born approximation with the charge density distributions obtained by SHF model to investigate the effect of the extended charge distributions of proton-rich nucl
... Show MoreThis study focuses on the implementation of interfaces for human machine interaction (HMI) control and monitor automatic production line. The automatic production line can performance feeding, transportation, sorting functions. The objectives of this study are implemented two SCADA/HMI system using two different software. TIA portal software is used to build HMI, alarm, and trends in touch panel which is helped an operator to control and monitor the production line. LabVIEW software is used to build HMI and trends in the computer screen and is linked with Microsoft Excel (ME) to generate information table helped to monitor the performance of the pneumatic equipment. The production line can do performance feeding, transportation, sorting fun
... Show MoreIn this study, the results of x-ray diffraction methods were used to determine the Crystallite size and Lattice strain of Cu2O nanoparticles then to compare the results obtained by using variance analysis method, Scherrer method and Williamson-Hall method. The results of these methods of the same powder which is cuprous oxide, using equations during the determination the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (28.302nm) and the lattice strain (0.03541) of the variance analysis method respectively and for the Williamson-Hall method were the results of the crystallite size (21.678nm) and lattice strain (0.00317) respectively, and Scherrer method which gives the value of c
... Show MoreThe fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely develo
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreNet pay is one of the most important parameters used in determining initial oil in place of a reservoir. It can be delineated through the using of limiting values of the petrophysical properties of the reservoir. Those limiting values are named as the cutoff. This paper provides an insight into the application of regression line method in estimating porosity, clay volume and water saturation cutoff values in Mishrif reservoir/ Missan oil fields. The study included 29 wells distributed in seven oilfields of Halfaya, Buzurgan, Dujaila, Noor, Fauqi, Amara and Kumait.
This study is carried out by applying two types of linear regressions: Least square and Reduce Major Axis Regression.
The Mishrif formation was
... Show More