Preferred Language
Articles
/
Mxbn4osBVTCNdQwCaOON
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based features and color based features. The extracted features are finally fed to Deep Belief Network (DBN) for classification purpose. Different tests were performed and different combinations of feature types are attempted. The achieved results showed that when using combined vectors of local descriptors, the system gives the desired accuracy which is 100%. The achieved result demonstrates the effectiveness of using local descriptors in solving malaria infection detection problem.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Decolorization of Phenol Red Dye by Immobilized Laccase in Chitosan Beads Using Laccase - Mediator - System Model
...Show More Authors

This work describes the enhancement of phenol red decolorization through immobilizing of laccase in chitosan and enzyme recycling. Commercial laccase from white rot fungus, Trametesversicolor (Tvlac), was immobilizedin to freshly prepared chitosan beads by using glutaraldehyde as a cross linker. Characterization of prepared chitosan was confirmed by FTIR and scanning electron microscope (SEM). Tvlac (46.2 U/mL) immobilized into chitosan beads at 0.8 % glutaraldehyde (v/v) within 24 hrs. Synthetic (HBT) and natural (vanillin) mediators were used to enhance dye decolorizoation. It was found that 89 % of phenol red was decolorized by chitosan beads within 180 min. in the absence of enzyme and mediator, while decolorization percenta

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Impact of Using Subsurface Water Retention Technology on Improving Water Use Efficiency of Furrow Irrigation System
...Show More Authors
Abstract<p>Evaluation was carried out on the existing furrow irrigation system located in an open agricultural field within Hor Rajabh Township, south of Baghdad, Iraq (latitude: 33°09’ N, longitude: 44°24’ E). Two plots were chosen for comparison: treatment plot T1, which used subsurface water retention technology (SWRT) with a furrow irrigation system. While the treatment plot T2 was done by using a furrow irrigation procedure without SWRT. A comparison between the two treatment plots was carried out to study the efficiency of the applied water on crop yield. In terms of agricultural productivity and water use efficiency, plot T1 outperformed plot T2, according to the study’s final fin</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
IoT-Based Low-Cost Smart Health Monitoring System using Raspberry Pi Pico W and Blynk Application
...Show More Authors

في السنوات الأخيرة، أدى التقدم التكنولوجي في إنترنت الأشياء (IoT) وأجهزة الاستشعار الذكية إلى فتح اتجاهات جديدة وإعطاء حلول عملية في مختلف قطاعات الحياة. يتم التعرف على إنترنت الأشياء كتنولوجيا حديثة تربط بين مختلف انواع الشبكات. تم تحسين أنواع مختلفة من قطاعات الرعاية الصحية في المجال الطبي بناءً على هذه التكنولوجيا. أحد هذه القطاعات الهامة هو نظام مراقبة الصحة (HMS). تعتبر مراقبة المريض عن بعد لاسلكيًا وبت

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon May 01 2017
Journal Name
Energy
Solidification enhancement in a triplex-tube latent heat energy storage system using nanoparticles-metal foam combination
...Show More Authors

View Publication
Scopus (182)
Crossref (179)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Pharmaceutical Research
Distribution of pslA among Local Isolates of Biofilm- Producing Pseudomonas aeruginosa
...Show More Authors

16S rRNA gene sequence examination is an effective instrument for characterization of new pathogens in clinical specimens. Akey component of colonization, biofilm formation, and protection of the pragmatic human pathogen Pseudomonasaeruginosais the biosynthesis of the exopolysaccharide Psl.Extracellular polysaccharides,biofilm, are secreted by microorganisms into the neighboring environment and are significant for surface attachment and keeping structural safety within biofilms.Biofilm production is an important technique for the survival of P. aeruginosa,and its association with antimicrobial resistance represents a defy for patient therapeutics. The aim of the current research is to assess the antibiotic resistance manner and distribution

... Show More
View Publication
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Determination of chemical composition of local black seeds Nigella sativa L
...Show More Authors

Chemical analysis for evaluation of Nigella sativa L. (black cumin) seeds showed a composition of Fat 39% ; Protein 28% ; Carbohydrate 21% ; Moisture 6% and Ash 4.5% . It was found that the black seed contains the following mineral element : Magnesium 0.26 gm /100gm seed ; Calcium 0.25 gm /100gm seed and Iron 25 ?g / gm /100gm seed ; zinc 4.51?g /gm /100gm seed and Copper 3.60 ?g /gm /100gm seed. The analysis also showed that mineral element I. e. ; lead ; Cobalt ; Nickel ; Chrom ; Cadmium and Aresenic are not present . It was found that the fat of the black seed contains the following fatty acids : Myristic 2.8%; Palmtic 16.6%; Stearic 0.8 % ; Oleic 13.79% ; Linoleic 64.2% and Arachidic 1.9% .

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Isolation and Identification of Local Bactria Produced from Soil-Borne Urease
...Show More Authors
Abstract<p>The hydrolysis of urea by the enzyme urease is significant for increasing the irroles in human pathogenicity, biocementation, soil fertilizer, and subsequently in soil improvement. This study devoted to the isolation of urease from urea-rich soil samples collected from seven different locations. Isolation of the various bacterial species was conducted using nutrient agar. The identity of isolated urease was based on morphological characteristics and standard microbiological and biochemical procedures. The urease producing strains of bacteria were obtained using the urease hydrolysis test. The bacterial isolates produced from soil samples collected from different environments and treat</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Purification and Characterization &#946; - lactamase produce from local isolate Klebsiella pneumonia
...Show More Authors

Beta-lactamase was purified from local isolate Klebsiella pneumonia by several steps included precipitation with ammonium sulphate at 20-40% saturation, DEAE- ion exchange chromatography and gel filtration on Sephacryl S-200 column. The obtained purification fold and recovery were 32.66; 47.04% respectively. The characterization of the purified beta-lactamase showed that the molecular weight was about 4000 daltons as determined by gel filtration.Purified enzyme had an optimal pH of 7 for activity and an optimal stability between pH 6.5-7.5, results shows that the optimal temperature appear to be 35 ? C .During storage the enzyme retained 72% at -20 ? C and retained 25% of the activity at the same period at 4 ? C.

View Publication Preview PDF
Crossref