Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based features and color based features. The extracted features are finally fed to Deep Belief Network (DBN) for classification purpose. Different tests were performed and different combinations of feature types are attempted. The achieved results showed that when using combined vectors of local descriptors, the system gives the desired accuracy which is 100%. The achieved result demonstrates the effectiveness of using local descriptors in solving malaria infection detection problem.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreImidacloprid is systemic insecticide (1-[(6-chloro-3-pyridinyl) methyl]-N-nitro-2-imidazolidinimine) and the world’s most widely used has significant efficacy against a broad variety of pests and a unique mode of action by using it spreader and irrigation. The persistence of this pesticide in the soil means that it causes environmental damage that must be cleaned up. In this study collected and identified the best bacteria isolate that breakdown imidacloprid from the Plant Protection Director in Baghdad, which has been using neonicotinoid pesticides for years in their own greenhouse for pest control. Using high-performance liquid chromatography HPLC to measuring the residual concentrations of imidacloprid in MSM media at a concentration o
... Show MorePesticide biodegradation can be accomplished by the technique of bioremediation, which makes use of microorganisms’ ability to degrade pesticide residues. This study aimed to separate and identify imidacloprid-biodegradable from botanical fields soil of greenhouses in the Plant Protection Directorate /Ministry of Agriculture in Baghdad, which has been using imidacloprid pesticides for many years. Using high-performance liquid chromatography, residual imidacloprid concentrations in MSM medium at a concentration of 25 mg/L after 21 days were measured to identify the best degrading bacterial isolates. Isolate No.37 the best bacterial isolate was able to degrade 63% of imidacloprid. was
To explore the durability of some local species of wood to fungal deterioration among the
storage period, this research has conducted on three species Eufcalyptus cammaldulensis,
Juglans regia, presence of some genus of fungi; Aspergillus, Penicillium,Botryoderma,
Chaetomium, Phoma, Cladosporium and Pacilomyces in different intensities.
The two fungi Aspergillus and Penicillium appeared more dominants than others, therefore
they were chosen for the pathogenicity test. The results showed that the two species of fungi
preferred Juglans wood firstly were the size of infection was more than 10 times of any of the
other two woods. Eucalyptus showed similar response to that of Morus, but with Aspergillus
it was few bett
This study is conducted to identify the microbial content of some types of infant milk formula available in the local markets of the city of Baghdad and their conformity microbial limits sited by the Iraqi standard. Seventy samples were collected from trademarks of imported infant milk formula included of five samples of infant milk formula No (1) and five samples of follow-up formula No (2). These samples were collected randomly from shops in the local markets of Baghdad city on both sides of Karkh and Rusafa included the following kinds: Dialac 1, Dialac 2 ,Celia 1, Celia 2 ,Biomil 1, Biomil 2 , Nactalia 1, Nactalia 2, Novalac 1 , Novalac 2 , Similac 1 , imilac 2 , Guigos 1, Guigos 2. Some microbial tests were done which in
... Show MoreHerpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreRation power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show More