Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based features and color based features. The extracted features are finally fed to Deep Belief Network (DBN) for classification purpose. Different tests were performed and different combinations of feature types are attempted. The achieved results showed that when using combined vectors of local descriptors, the system gives the desired accuracy which is 100%. The achieved result demonstrates the effectiveness of using local descriptors in solving malaria infection detection problem.
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
This study is conducted to identify the microbial content of some types of infant milk formula available in the local markets of the city of Baghdad and their conformity microbial limits sited by the Iraqi standard. Seventy samples were collected from trademarks of imported infant milk formula included of five samples of infant milk formula No (1) and five samples of follow-up formula No (2). These samples were collected randomly from shops in the local markets of Baghdad city on both sides of Karkh and Rusafa included the following kinds: Dialac 1, Dialac 2 ,Celia 1, Celia 2 ,Biomil 1, Biomil 2 , Nactalia 1, Nactalia 2, Novalac 1 , Novalac 2 , Similac 1 , imilac 2 , Guigos 1, Guigos 2. Some microbial tests were done which in
... Show MoreTo explore the durability of some local species of wood to fungal deterioration among the
storage period, this research has conducted on three species Eufcalyptus cammaldulensis,
Juglans regia, presence of some genus of fungi; Aspergillus, Penicillium,Botryoderma,
Chaetomium, Phoma, Cladosporium and Pacilomyces in different intensities.
The two fungi Aspergillus and Penicillium appeared more dominants than others, therefore
they were chosen for the pathogenicity test. The results showed that the two species of fungi
preferred Juglans wood firstly were the size of infection was more than 10 times of any of the
other two woods. Eucalyptus showed similar response to that of Morus, but with Aspergillus
it was few bett
Imidacloprid is systemic insecticide (1-[(6-chloro-3-pyridinyl) methyl]-N-nitro-2-imidazolidinimine) and the world’s most widely used has significant efficacy against a broad variety of pests and a unique mode of action by using it spreader and irrigation. The persistence of this pesticide in the soil means that it causes environmental damage that must be cleaned up. In this study collected and identified the best bacteria isolate that breakdown imidacloprid from the Plant Protection Director in Baghdad, which has been using neonicotinoid pesticides for years in their own greenhouse for pest control. Using high-performance liquid chromatography HPLC to measuring the residual concentrations of imidacloprid in MSM media at a concentration o
... Show MorePesticide biodegradation can be accomplished by the technique of bioremediation, which makes use of microorganisms’ ability to degrade pesticide residues. This study aimed to separate and identify imidacloprid-biodegradable from botanical fields soil of greenhouses in the Plant Protection Directorate /Ministry of Agriculture in Baghdad, which has been using imidacloprid pesticides for many years. Using high-performance liquid chromatography, residual imidacloprid concentrations in MSM medium at a concentration of 25 mg/L after 21 days were measured to identify the best degrading bacterial isolates. Isolate No.37 the best bacterial isolate was able to degrade 63% of imidacloprid. was
Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP