Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and estimation. The current method (visual quantification methods) of image quantification is time-consuming and cumbersome, and manual measurement is imprecise because of the natural differences among human eyes’ abilities. Subsequently, objective outcome evaluation can obviate the drawbacks of the current methods and facilitate recording for documenting function and research purposes. To achieve a fast and valuable objective estimation of fluorescence in each image, an algorithm was designed based on machine vision techniques to extract the targeted objects in images that resulted from confocal images and then estimate the covered area to produce a percentage value similar to the outcome of the current method and is predicted to contribute to sustainable biotechnology image analyses by reducing time and labor consumption. The results show strong evidence that t-designed objective algorithm evaluations can replace the current method of manual and visual quantification methods to the extent that the Intraclass Correlation Coefficient (ICC) is 0.9.
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis research aims to reveal the quality standards available in press images published in the news sites, the Iraqi News Agency and Al-Mada Press for the period from: 1/9/2019, to: 30/9/2019. The research is a descriptive research, in which the researcher relied on the survey methodology to achieve its objectives. The research reached a number of results, most notably the weak role of photojournalists in the websites and the adoption of those the Internet as a source for obtaining press images published with news and reports through its pages, as well as the neglect of the standard Description/Comment below the press images, which plays an important function in explaining and interpreting them for users.
Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Praise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani
... Show MoreThe growing water demand has raised serious concerns about the future of irrigated agriculture in many parts all over the world, changing environmental conditions and shortage of water (especially in Iraq) have led to the need for a new system that efficiently manages the irrigation of crops. With the increasing population growing at a rapid pace, traditional agriculture will have a tough time meeting future food demands. Water availability and conservation are major concerns for farmers. The configuration of the smart irrigation system was designed based on data specific to the parameters concerning the characteristics of the plant and the properties of soil which are measured once i
Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al
... Show MoreAbstract
The aim of this study was to prepare rebamipide ocular inserts in order to extend its release on the ocular surface for dry eye treatment. Solubility study was applied to the drug with or without l-arginine using different solvents. Solvent casting technique was used to prepare the inserts; l-arginine was used to solubilize the drug, hydroxypropyl methylcellulose grades (E5 and K15M) and poly ethylene glycol 200 were used as excipients. The inserts were evaluated for their physical and mechanical properties, moisture loss% and absorption %, surface pH, and in-vitro drug release. The use l-arginine exhibited an enhancement of rebamipide solubility in both deionized water and phosphate buffer (pH 7.4) by a
... Show MoreWe try through this research to show the relationship between the crescent and the month in the Koran, and then their importance and their relationship to timing, and the timing of this relationship with people, and the significance of these timings, so we gathered verses that spoke about the family and the month, and we tried to study them in a detailed objective study, so this came The research of five subjects was the first topic introductory research and the time and month, while the remaining four detectives on the verses that talked about the timing of the month, and we have explained the relationship of this timing with people and the significance of these times.