LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show MoreThe last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of
... Show MoreThe successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the domain of deep learning, further advancements and refinements in the models and datasets can be expected, potentially leading to even more accurate and efficient classification systems for grapevine leaves and beyond. Overall, this research provides valuable insights into the potential of deep learning for agricultural applications and paves the way for future studies in this domain. This work employs a convolutional neural network (CNN)-based architecture to perform grapevine leaf image classifi
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreThe trichomes and chemical composition of three species of the genus Salvia wild-grown (Salvia lanigera, Salvia spinosa) and cultured (Salvia officinalis) were studied in the Anbar governate, the chemical components of the stem and leaves were studied by Gas chromatography–mass spectrometry(GC-MS), in addition to studying the trichomes of the epidermis in the stem and leaves (upper and lower epidermis) by Light microscope. Important differences appeared to us in the chemical study, where it was found that some compounds were found in species without others, which gives them taxonomic importance, also, the trichomes were important in distinguishing the studied species, the species S. spinosa was distinguished by the presence of gla
... Show MoreImage compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
This research presents a statistical study of radiation generated from communication towers in the Nineveh Plain region Baghdeda. The intensity of radiation energy was measured at 10 meters away from the communication tower in different locations, using a (1PC XH-901 Dosimeter/ Personal Dose Alarm / Radiation Detector, dosage rate: 0.01 μSv/h to 150μSv/h) to measure the amount of radiation at various times. Energy densities were measured and compared with standard limits provided by other authorities, such as the International Committee for Radiation Protection. Results were analyzed using SPSS version 26 to implement the data. The results show that the means of the radiation levels measured at all the zones do not statistically differ
... Show MoreThe present study aimed at shed light on the association between HLA-class I antigens (A, B and Cw) and brain tumours (meningioma and glioma) in the basis of their individual frequencies or two-locus association A total of 52 brain tumour patients were enrolled in this study, with an age range of 7-68 years. The patients were divided into two clinical groups; meningioma (20 cases) and glioma (22 cases), while the remaining 10 cases represented other types of brain tumour. Control samples included 47 Iraqi Arab apparently healthy blood volunteers, with an age range of 15-50 year. Three HLA antigens showed a significant increased frequency in total patients as compared to controls. They were B13 (34.6 vs. 6.5%), B40 (15.4 vs. 2.2%) and Cw3
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThe aldol condensation of 2-acetylnaphthalene with 9-anthracene carboxaldehyde afforded α, β-unsaturated keton (1) . New heterocyclic compounds containing: cyclohexenone[2], indazole[3], pyrimidinethion [4], thiazolo fused pyrimidine[5], isoxazoline[6], substituted pyrazoline[7]a-d and pyrimidinone[8] rings system were synthesized from α, β-unsaturated keton[1]. Cyclization of [1] with ethylacetoacetate gave the mentioned heterocycle cyclohexanone [2]. The cyclo condensation of [2] with hydrazine gave the new indazole derivative [3]. furthermore, the reation of [1]with thiourea gives thiopyrmidine derivative [4]. The cyclo condensation of [4] with chloroacetic acid gave the fused rings [5]. Then reacted compound[1] with hydroxy
... Show More