Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based features and color based features. The extracted features are finally fed to Deep Belief Network (DBN) for classification purpose. Different tests were performed and different combinations of feature types are attempted. The achieved results showed that when using combined vectors of local descriptors, the system gives the desired accuracy which is 100%. The achieved result demonstrates the effectiveness of using local descriptors in solving malaria infection detection problem.
Background: Reliable detection the etiological agent of amoebic dysentery and extra-intestinal amoebiasis have Public health importance specially in asymptomatic human and animals, Since the acquisition of pet dogs in the recent period has become widespread in our city. Aim: To give correct perception of infection rate in asymptomatic individuals (human and domestic dogs) for the first aspect and about detection and diagnosis of the pathogenic species of Entamoeba histolytica from another morphologically similar and commensal one using the molecular technique in stool samples of asymptomatic individuals the second aspect. Methods: During the study period from the beginning of September 2020 to the end of February 2021, a total of 95 stool s
... Show MoreThe operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreSalmonella enteritidis one of more important as epidemiological bacteria between other salmonella types. It is very important pathologically that cause food poising and gastrointestinal tract infections. This study includes some of immunological changes that appear by ELISA test and antibiotic sensitivity test against these bacteria in mice. ELISA test results appears high immunological response happen after 3 days of inoculation, mean titration readings beginning 0.198 and the maximum mean titration after 15 days of inoculation 1.538 and begin to decrease after this time slowly to remain about 0.297 after 40 days of inoculation. An antibiotics sensitivity test result appears, this bacteria sensitive to Chloramphenicol, Ceftriaxone,
... Show MoreObjectives: to assess nurses' knowledge toward infection control measures for hepatitis a virus in hemodialysis
units and to detemine the relationship between nurses' knowledge and their demographical characteristics.
%eihs:::°mg:rA5th:e;:#tt£:eoscTodbyerw9¥,C22;5];e.d°utathem°dialysisunitsofBaghdadTeachingHospha|sstated
A non-probability `tturposive" sample of (51) nurses, who were working in hemodialysis units were selected
from Baghdad teaching hosphals. The data were collected through the use of constructed questionnaire, which
consists of two parts (I) Demographic data fom that consists of 10 items and (2) Nurses' knowledge form that
consists of 6 sections contain 79 items, by means of direct interview techniq
Global Navigation Satellite Systems (GNSS) have become an integral part of wide range of applications. One of these applications of GNSS is implementation of the cellular phone to locate the position of users and this technology has been employed in social media applications. Moreover, GNSS have been effectively employed in transportation, GIS, mobile satellite communications, and etc. On the other hand, the geomatics sciences use the GNSS for many practical and scientific applications such as surveying and mapping and monitoring, etc.
In this study, the GNSS raw data of ISER CORS, which is located in the North of Iraq, are processed and analyzed to build up coordinate time series for the purpose of detection the
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
This paper reports a fiber Bragg grating (FBG) as a biosensor. The FBGs were etched using a chemical agent,namely,hydrofluoric acid (HF). This implies the removal of some part of the cladding layer. Consequently, the evanescent field propagating out of the core will be closer to the environment and become more sensitive to the change in the surrounding. The proposed FBG sensor was utilized to detect toxic heavy metal ions aqueous medium namely, copper ions (Cu2+). Two FBG sensors were etched with 20 and 40 μm diameters and fabricated. The sensors were studied towards Cu2+ with different concentrations using wavelength shift as a result of the interaction between the evanescent field and copper ions. The FBG sensors showed
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More