Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of artefacts in virtual restoration is presented based on reverse engineering techniques. Two case studies were selected and processed in Iraq to meet the aim of this research and show how reverse engineering approaches can save our culture. The efficiency and safety of the preservation and restoration of cultural relics are improved and visually demonstrated. Different reverse engineering techniques applied to show the geometric potential for such approaches following laser-based 3D data application.
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
Diode lasers are becoming popular in periodontal surgery due to their highly absorption by pigments such as melanin and hemoglobin their weak absorption by water and hydroxyapatite makes them safe to be used around dental hard tissues. Objective: The aim of the present study was to evaluate the efficiency of diode laser in performing gingivectomy in comparison to conventional scalpel technique in patients with chronic inflammatory enlargement. Materials and methods: Thirty patients were selected for this study. All of them required surgical treatment of gingival enlargements and were randomly divided into two groups: Control group (treated by scalpel and include sixteen patients) and study group (treated with diode laser 940nm and includ
... Show MoreWe propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.
Integrated project delivery is collaboratively applying the skills and knowledge of all participants to optimize the project's results, increase owner value, decrease waste, and maximize efficiency during the design, fabrication, and construction processes. This study aims to determine IPD criteria positively impacting value engineering. To do this, the study has considered 9 main criteria according to PMP classification that already covers all project phases and 183 sub-criteria obtained from theoretical study and expert interviews (fieldwork). In this study, the SPSS (V26) program was used to analyze the main criteria and sub-criteria priorities from top to bottom according to their values of the Relative Importance In
... Show MoreIn a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u
... Show MoreElectronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exp
... Show More