Preferred Language
Articles
/
Jxg6aZQBVTCNdQwCChUu
Automatic brain tumor segmentation from MRI images using region growing algorithm
...Show More Authors

LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2

View Publication
Publication Date
Mon Jul 21 2025
Journal Name
Iraqi Journal Of Biotechnology
STUDY ON TOTAL PEROXIDASE ENZYMES ACTIVITIES AND SOME TRACE ELEMENTS IN PATIENTS WITH BREAST TUMORS
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Analysis of the absorption spectra in the visible and ultraviolet regions of some medical ointments available in Iraqi markets
...Show More Authors

Three types of medical commercial creams Silvazine, Cinolon Tar and Hydroquinon Domina were incorporated in this study. The medical creams were taken directly and placed uniformly on the glass slide. Each type of pharmaceutical was weighed at 1 mg and dispersed on an area of 1x1 cm. This process ensures same thickness for all samples. The creams were analyzed by using double-beam UV/visible spectrophotometer Metertech SP8001. The absorption spectrum for each of samples was measured against wavelength range of 300–700 nm.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Magnetic solar surface flux transport simulation
...Show More Authors

In this paper, the solar surface magnetic flux transport has been simulated by solving the diffusion–advection equation utilizing numerical explicit and implicit methods in 2Dsurface. The simulation was used to study the effect of bipolar tilted angle on the solar flux distribution with time. The results show that the tilted angle controls the magnetic distribution location on the sun’s surface, especially if we know that the sun’s surface velocity distribution is a dependent location. Therefore, the tilted angle parameter has distribution influence.

View Publication Preview PDF
Crossref
Publication Date
Thu May 05 2022
Journal Name
Al-kindy College Medical Journal
Spinal Tuberculosis in Children
...Show More Authors

Tuberculosis continues to be the leading cause of morbidity and mortality, with an estimated annual incidence of 10.4 million worldwide. It has been estimated that 10% of patients with extrapulmonary tuberculosis have musculoskeletal involvement, with the spine being the most common. Spinal tuberculosis (TB) accounts for 50% of cases of musculoskeletal tuberculosis.

Spinal tuberculosis is the result of infection with Mycobacterium tuberculosis. It is a secondary infection, the primary lesion of which is in the lungs, genitourinary system, or gastrointestinal tract and can be active or latent. Involvement of the vertebral segment is the result of hematogenous spread of infection along the arterial pathway or Batson's vei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Motion picture output in digital commercial advertising: وسام عبد عبد العزيز -نعيم عباس حسن
...Show More Authors

Mobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Archives Of Razi Institute
Prognostic Value of Intracellular Transcription of Factors HIF-1α and p53 and Their Relation to Estradiol and TNM Parameters of Breast Cancer Tissues in Women with Invasive Ductal Carcinoma in Thi-Qar Province, Iraq
...Show More Authors

Breast cancer is the most common malignancy affecting women's health, with an increasing incidence worldwide. This study aimed to measure the intracellular concentration of the hypoxia-inducible factor 1 α (HIF-1α), tumor suppression protein p53, and estradiol (E2) in tumor tissues of adult females with breast cancer and their relation to tumor grade, tumor size, and lymph node metastases (LNM). The study was conducted on 65 adult female participants with breast mass admitted to the operating theater in Al-Hussein Teaching Hospital and Al-Habboby Teaching Hospital in Nasiriyah, Iraq, from January to November 2021. Fresh breast tumor tissues were collated and homogenized for intracellular biochemical analysis using the enzyme-linked immuno

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus