Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to restore the artifacts happened in the binary map. Results: The tests results specified that the proposed method is a fast static sprite area detection algorithm that leads quickly to remarkable sprite location. Conclusion: It is found that the proposed strategies can allocate the sprite (survive) areas easily and in appropriate way and distinguish static sprite region which demonstrate survived region.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreLymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThe main target of the current study is to investigate the microbial content and mineral contaminants of the imported meat available in the city of Baghdad and to ensure that it is free from harmful bacteria, safe and it compliances with the Iraqi standard specifications. Some trace mineral elements such as (Iron, Copper, Lead, and Cadmium) were also estimated, where 10 brands of these meats were collected. Bacteriological tests were carried out which included (total bacterial count,
This study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet
... Show MoreDetection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreThis paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show More