Deep Learning Techniques For Skull Stripping of Brain MR Images
Importance of the research:
The importance of any educational or scientific research through its intellectual arena of facts supply the individual and society, Supports Knowledge and Science Group, which raised will be locked in these topics in the future.
This research seeks to shed light on the image and the role of women and men in the books of the Arabic language in primary education (primary), To illustrate the negative effects of the phenomenon of sexism in textbooks, And its negative impact on emerging, And stay away as much as possible about the distinction between the sexes in the roles and qualities in textbooks traditional stereotypes and remove that put both sexes templates hinder the development of the individual and t
DBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
This study is targeting the new developed materials and techniques and how they were affected by the scientific and technological developments that contributed to revelated new and varied developed materials and techniques. And from the artist’s formulation by using the materials and techniques and through its embodiment and sensor the values, artistic and aesthetic standards by breaking from the familiar in aesthetic contemporary way.
The studies on questioning what’s the role of The New Developed Materials and Techniques in exposing the aesthetic of the art work?
This study is to show the aesthetic of the art work through the new developed materials and techniques. Which was based on descriptive analyzing method and hig
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreBecause of Citrobacter freundii medical and economical importance and that there are only little local studies about it, this study aimed to isolate and identify this important bacterial species from others that have a similar biochemical and morphological characteristics. Twenty five chicken meat samples were collected randomly from local markets in Baghdad city during 2017; Citrobacter was isolated from the collected samples using selective and differential media and identified using biochemical tests, the identification was confirmed using Vitek 2 compact and polymerase chain reaction for 16S rRNA and the isolated bacteria identified as C. freundii.
Background :
Colorectal cancer (CRC) is the 4th common gastrointestinal cancer. (BRAFV600E) is a member of RAF family of serine/threonine protein kinases that function to regulate the (MAPK) / (ERK) pathway. BRAFV600E mutated CRC are associated with right-sided primary tumors, older women and high-grade tumors.
Aims of the study:
Study the immunohistochemical expression of BRAFV600E biomarker in a sample of Iraqi patients with colorectal cancer and the correlation of BRAFV600E expression with other clinicopathological variables such as patient's age and tumor gra
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreCarbon Monoxide (CO) has a significant indirect effect on greenhouse gasses due to its ozone and carbon dioxide precursor, and its mechanism of degradation involving the hydroxyl radical (OH) which control the oxidizing ability of the tropospheric. To understand the effect of human activities on atmospheric composition, accurate estimates of the sources of atmospheric carbon monoxide (CO) are necessary. MOPITT (Measurements of Pollution in the Troposphere) is a NASA Terra satellite instrument designed to allow both Thermal-Infra-Red (TIR) and Near-Infra-Red (NIR) observations to be used to collect vertical CO profiles in the Troposphere via the concept of correlation spectroscopy. The objective of the current stu
... Show MoreMost systems are intelligent and the industrial world is moving now towards
technology. Most industrial systems are now computerized and offer a high speed.
However, Face recognition is a biometric system that can identify people from their
faces. For few number of people to be identified, it can be considered as a fast
system. When the number of people grew to be bigger, the system cannot be adopted
in a real-time application because its speed will degrade along with its accuracy.
However, the accuracy can be enhanced using pre-processing techniques but the
time delay is still a challenge. A series of experiments had been done on AT&TORL
database images using Enhanced Face Recognition System (EFRS) that is