Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based features and color based features. The extracted features are finally fed to Deep Belief Network (DBN) for classification purpose. Different tests were performed and different combinations of feature types are attempted. The achieved results showed that when using combined vectors of local descriptors, the system gives the desired accuracy which is 100%. The achieved result demonstrates the effectiveness of using local descriptors in solving malaria infection detection problem.
To explore the durability of some local species of wood to fungal deterioration among the
storage period, this research has conducted on three species Eufcalyptus cammaldulensis,
Juglans regia, presence of some genus of fungi; Aspergillus, Penicillium,Botryoderma,
Chaetomium, Phoma, Cladosporium and Pacilomyces in different intensities.
The two fungi Aspergillus and Penicillium appeared more dominants than others, therefore
they were chosen for the pathogenicity test. The results showed that the two species of fungi
preferred Juglans wood firstly were the size of infection was more than 10 times of any of the
other two woods. Eucalyptus showed similar response to that of Morus, but with Aspergillus
it was few bett
Imidacloprid is systemic insecticide (1-[(6-chloro-3-pyridinyl) methyl]-N-nitro-2-imidazolidinimine) and the world’s most widely used has significant efficacy against a broad variety of pests and a unique mode of action by using it spreader and irrigation. The persistence of this pesticide in the soil means that it causes environmental damage that must be cleaned up. In this study collected and identified the best bacteria isolate that breakdown imidacloprid from the Plant Protection Director in Baghdad, which has been using neonicotinoid pesticides for years in their own greenhouse for pest control. Using high-performance liquid chromatography HPLC to measuring the residual concentrations of imidacloprid in MSM media at a concentration o
... Show MoreThe current research attempts to find a feed additive that enhances fish growth and eliminate toxins generated from fungi and mold, which are found in improperly manufactured and stored feed, while ensuring the safety of these fish meat for the consumer. Therefore, the organic properties of chitosan powder were examined in order to determine its impact on maturation of young
Pesticide biodegradation can be accomplished by the technique of bioremediation, which makes use of microorganisms’ ability to degrade pesticide residues. This study aimed to separate and identify imidacloprid-biodegradable from botanical fields soil of greenhouses in the Plant Protection Directorate /Ministry of Agriculture in Baghdad, which has been using imidacloprid pesticides for many years. Using high-performance liquid chromatography, residual imidacloprid concentrations in MSM medium at a concentration of 25 mg/L after 21 days were measured to identify the best degrading bacterial isolates. Isolate No.37 the best bacterial isolate was able to degrade 63% of imidacloprid. was
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreHerpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn this work, seven soil samples were brought brought to study and analyses the element concentrations from different southern regions of Iraq using laser-induced breakdown spectroscopy (LIBS) technique. It has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyze elements in materials (gases, liquids, and solids). In order to analyze elements in materials (gases, liquids, and solid). The Nd: YAG laser excitation source at 1064 nm with pulse width 9 ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320-740 nm. From this investigation, the soil sample analysis of the southern cities of Iraqi, it is concluded that the rich soil element of P, Si,
... Show MoreIn this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.