The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
This work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages, (10 rpm) discs speed of stainless steel discs, (pH=9.5) of feed solution and (pH=2) of acceptor solution in n-decane. Assuming the existen
... Show MoreAbstract: Iatrogenic furcal root perforations are serious complications during dental treatment. This study was aimed to compare the sealing ability of new bioceramic root repair material TotalFill® with the other perforation repair materials (GIC, MTA and Biodentine) using a dye- extraction method.Materials and Methods: Forty extracted, human mandibular molars with non-fused well developed root were collected. Artificial perforations were made from the external surface of the teeth. Then the teeth were randomly divided into 4 experimental groups (n= 10) according to the type of repair material used in this study; Medifil glass ionomercement, TotalFill® bioceramic root repair material, BiodentineTM and MTA Plus. The specimens were then im
... Show MoreThe aim of present work is to study the removal of phenol present in aqueous feed solution by the emulsion liquid membrane technique using kerosene as a diluent, sodium hydroxide as a stripping agent, and sorbitan monooleate (Span 80) as a surfactant. The parameters studied were: surfactant concentration, volume ratio of membrane phase to internal phase, and stirring speed. It was found that more than 98% of phenol can be removed at the conditions were surfactant concentration 2% (v/v), volume ratio of membrane phase to internal phase 5:1 and stirring speed 400 rpm. Maximum phenol extraction efficiency at 7 minutes of process time was observed. It was found that there was a good agreement between the standard kerosene an
... Show MoreLipase enzyme has attracted a lot of attention in recent years because of its diverse biotechnological applications. The present study was conducted to screen germinated seeds of four crops, namely sunflower (Helianthus annuus), flaxor linseed (Linum usitatissimum ), peanut (Arachis hypogaea ) and castor bean (Ricinus communis), for the activity of their lipases. to the study also included the extraction and purification of lipase from the seeds of the most promising crop using different solvents. The results indicated that the maximum enzymatic activity (0.669 U/ml) was obtained when 0.1 M Tris-HCl buffer extract was used after 3 days of seed germination of all the tested species, as compared to the other test solvents
... Show MoreTwo different oxidative desulfurization strategies based on oxidation/adsorption or oxidation/extraction were evaluated for the desulfurization of AL-Ahdab (AHD) sour crude oil (3.9wt% sulfur content). In the oxidation process, a homogenous oxidizing agent comprising of hydrogen peroxide and formic acid was used. Activated carbons were used as sorbent/catalyst in the oxidation/adsorption process while acetonitrile was used as an extraction solvent in the oxidation/extraction process. For the oxidation/adsorption scheme, the experimental results indicated that the oxidation desulfurization efficiency was enhanced on using activated carbon as catalyst/sorbent. The effects of the operating conditions (contact time, temperat
... Show MoreAnchusa strigosa L.: Hardy annual biennial or perennial herb, with hairs especially on the leaves., flowers generally regular. Commonly named (Lisan Althour) in Iraq, from Boraginaceae family. The plant contains phenolic acids, flavonoids, alkaloids, sterols, and terpenoids. The Whole plant part defatted with n-hexane for 24 hours. The defatted plant material extracted using absolute methanol by Soxhlet apparatus for 24 hours, the extract fractionated by solvents of different polarity: petroleum ether- chloroform - ethylacetate- and n-butanol respectively. The n-butanol fraction hydrolyzed with 10% HCl for 5 hours by reflex to break down the glycosidic linkage. Rosmarinic acid, caffeic acid, genistein, and silybin were isolated
... Show MoreSurveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.