Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based features and color based features. The extracted features are finally fed to Deep Belief Network (DBN) for classification purpose. Different tests were performed and different combinations of feature types are attempted. The achieved results showed that when using combined vectors of local descriptors, the system gives the desired accuracy which is 100%. The achieved result demonstrates the effectiveness of using local descriptors in solving malaria infection detection problem.
Human cytomegalovirus (CMV) is the globally highly prevalent herpesvirus worldwide. CMV infects populations of all ages according to the Center for Disease Control and Prevention (CDC) and World Health Organization (WHO). CMV infections remain the most common viral complication potentially multiple in humans and are a major cause of congenital normality in women, which is why they are critical for diagnosis in several times when it happens during pregnancy. Pregnant women with CMV infection can be in charge of abortion or congenital expandaedby. This study involves the collection a total of (90) samples taken from each aborted and pregnant woman (70 with abortion cases and 20 of pregnant without history of abortion as control subjects) r
... Show MoreAbortion is categorized as the termination of conception caused by the failure or removal of the embryo from the uterus before the conclusion of pregnancy. Microorganisms and genetic factors are two of the many factors associated with abortion. Cytomegalovirus is a widespread congenital virus infection pathogen that affects a wide variety of people. The prothrombin gene is one of the essential causes that trigger blood clotting and the function of abortion women, therefore the aim of the study is to detect and associate Cytomegalovirus and prothrombin gene mutation (Gene ID: 14061 in NCBI) with abortion through genetic and immunological methods. Five ml of whole blood was collected from an intravenous puncture and divided into two tubes,
... Show MoreThe development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t
... Show MoreThe aim of the research is to identify the level of both organizational trust and decentralized performance of those in charge of managing local championships for the Iraqi Athletics Federation, and to identify the effect of organizational trust in decentralized performance from their point of view. The descriptive approach was based on the method of relational relations on a sample of those in charge of managing local championships for the Iraqi Federation In athletics, represented by each of (coaches, referees, members, president and members of the administrative body of the central federation, and the president of members of sub-federations) for the sports season (2020/2021) of 260 individuals, all of them were intentionally chosen by (1
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (
... Show MoreThis research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”
The proposed model is designed for the disclosure of joint auditing and the role
... Show More