This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods
We propose a system to detect human faces in color images type BMP by using two methods RGB and YCbCr to determine which is the best one to be used, also determine the effect of applying Low pass filter, Contrast and Brightness on the image. In face detection we try to find the forehead from the binary image by scanning of the image that starts in the middle of the image then precedes by finding the continuous white pixel after continuous black pixel and the maximum width of the white pixel by scanning left and right vertically(sampled w) if the new width is half the previous one the scanning stops.
In this paper, a new tunable approach for fusion the satellite images that fall in different electromagnetic wave ranges is presented, which gives us the ability to make one of the images features little superior on the other without reducing the general resultant image fusion quality, this approach is based on the principal component analysis (PCA) fusion method. A comparison made is between the results of the proposed approach and two fusion methods (they are: the PCA fusion method and the projection of eigenvectors on the bands fusion method), and the comparison results show the validity of this new method.
Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t
... Show MoreBackground: Lowering the amount of iodinated contrast material and tube voltage may increase pulmonary artery opacification and thrombus identification without compromising picture quality.
Objectives: To explore the efficiency of using lower tube voltage and a lower contrast medium dose for conducting computed tomography for pulmonary angiography (CTPA) aiming to increase its accuracy in detecting pulmonary thromboembolism (PTE).
Subjects and Methods:100 patients scheduled for CTPA with a preoperative diagnosis of PTE were grouped into two: group A, (50 patients) got 1 mL/kg at 120 kV and group B, (50 patients) received 0.5 mL/kg at 80 kV.The tec
... Show MoreAbstract
Oil is considered a commodity and is still an important and prominent role in drawing and shaping the Iraqi economic scene. The revenues generated from the export of oil are considered the main source of the general budget in cash flows.
Since the revenues consist of quantity and price and the latter is an external factor which is difficult to predict, The effect of any commodity on its price, which is proven in the theory of micro-economic, but it is observed through the research that the response is slow, which means not to take advantage of the rise in prices, by increasing the quantity exported, the result of several facto
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreType 1 diabetes mellitus (T1DM) is an autoimmune disease frequently associated with autoimmune thyroid disease (AITD). The study is conducted at the Specialized Center for Endocrinology and Diabetes-Baghdad at Al-karkh side, during December 2013 up to April 2014. In this study, we investigate the prevalence of anti-thyroid peroxidase (anti-TPO) antibody in(80) type1 diabetic patients with (AITD) and (30) healthy controls .Blood samples are taken for investigation of thyroid tests by using Vitek Immunodiagnstic Assay System (VIDAS).Enzeme Linked Immunosorbent Assay (ELISA) is used to detect anti-thyroid antibody(anti-TPO). The results show that age, gender and BMI (body mass index) are similar in both groups, p>0.05. Among 80 type1 diabetic
... Show MoreIt is well known that sonography is not the first choice in detecting early breast tumors. Improving the resolution of breast sonographic image is the goal of many workers to make sonography a first choice examination as it is safe and easy procedure as well as cost effective. In this study, infrared light exposure of breast prior to ultrasound examination was implemented to see its effect on resolution of sonographic image. Results showed that significant improvement was obtained in 60% of cases.
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More