Segmentation of real world images considered as one of the most challenging tasks in the computer vision field due to several issues that associated with this kind of images such as high interference between object foreground and background, complicated objects and the pixels intensities of the object and background are almost similar in some cases. This research has introduced a modified adaptive segmentation process with image contrast stretching namely Gamma Stretching to improve the segmentation problem. The iterative segmentation process based on the proposed criteria has given the flexibility to the segmentation process in finding the suitable region of interest. As well as, the using of Gamma stretching will help in separating the
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreCholesteryl ester transfer protein gene contains some single nucleotide polymorphisms, which have been associated with serum high-density lipoprotein concentration and other lipoproteins. This study is done for determining of cholesteryl ester transfer protein polymorphism and evaluate its effect on serum lipid profile concentrations in some hyperlipidemic patients compared with healthy subjects in Salah Al-din governorate-Iraq. Blood samples were taken from (90) patients suffering from hyperlipidemia, and (70) samples that were apparently healthy controls. Serum lipid concentrations were measured by enzymatic assays. The polymorphism was genotyped using polymerase chain reaction restriction fragment length polymorphism analysis.&n
... Show MoreA new ligand (H4L) and its complexes with ( ZnII, CdII and HgII) were prepared. This ligand was prepared in two steps. In the first step a solution of terephthaldehyde in methanol was reacted under reflux with 1,2-phenylenediamine to give an precursor compound which reacted in the second step with 2,4-dihydroxybenzaldehyde to give the ligand. The complexes were then synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods FT-IR, UV-Vis, 1 HNMR, and atomic absorption, chloride content, HPLC, mole-ratio determination. in addition to conductivity measurement. The data of these measurements suggest a distorted tetrahedral geometry for ZnII, C
... Show MoreA new ligand (H4L) and its complexes with ( ZnII, CdII and HgII) were prepared. This ligand was prepared in two steps. In the first step a solution of terephthaldehyde in methanol was reacted under reflux with 1,2-phenylenediamine to give an precursor compound which reacted in the second step with 2,4-dihydroxybenzaldehyde to give the ligand. The complexes were then synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods FT-IR, UV-Vis, 1HNMR, and atomic absorption, chloride content, HPLC, mole-ratio determination. in addition to conductivity measurement. The data of these measurements suggest a distorted tetrahedral g
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Transient drop in the heart beat or transient heart block (AVB) may be consider the main cause of syncope or presyncope inpatients with bifascicular block and syncope According to the Guidelines for cardiac pacing pacemaker consider part of treatment. Aims of our study were to evaluate whether there is role for EPS in patients BFB and to evaluate the symptoms after pacing. 42 patients were enrolled in this study, with mean age value (63.4± 12.2years), suffer from interventricular conductive defect and syncope; patients underwent EPS on admission time, and pacemaker implantation accordingly and programmed follow up for the device in the last four years. Our patients were 25 (59.5%) male and 17 (40.5%)female, all of them with syncope o
... Show MoreThe residual limb within the prosthesis, is often subjected to tensile or fatigue stress with varying temperatures. The fatigue stress and temperatures difference which faced by amputee during his daily activities will produces an environmental media for growth of fungi and bacteria in addition to the damage that occurs in the prosthesis which minimizingthe life of the prosthetic limb and causing disconfirm feeling for the amputee.
In this paper, a mechanical and thermal properties of composite materials prosthetic socket made of different lamination for perlon/fiber glass/perlon, are calculated by using tesile test device under varying temperatures ( from 20oC to 60oC), also in this paper a device for measuring rotational bendin
... Show More