Detection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with 213 eyes examined in Iraq and obtained AUCs of 0.91–0.92 and an accuracy range of 88–92%. The proposed model is a step toward improving the detection of clinical and subclinical forms of KCN.
In this research we study a variance component model, Which is the one of the most important models widely used in the analysis of the data, this model is one type of a multilevel models, and it is considered as linear models , there are three types of linear variance component models ,Fixed effect of linear variance component model, Random effect of linear variance component model and Mixed effect of linear variance component model . In this paper we will examine the model of mixed effect of linear variance component model with one –way random effect ,and the mixed model is a mixture of fixed effect and random effect in the same model, where it contains the parameter (μ) and treatment effect (τi ) which has
... Show MoreMany international studies indicated that the polymorphisms of some genes disturbed the folate homocysteine (Hcy) metabolism and increased the vulnerability to Down syndrome (DS). We aimed to measure the serum levels of folate and Hcy in DS children and compare the levels with age and sex-matched apparently normal healthy children. We also aimed to study the A80G polymorphism of the gene reduced folate carrier (RFC1) in the DS children as a risk factor. Forty children with DS (24 were boys, and 16 were girls) with the age range between 5-13 years, and 26 normal healthy children (16 boys and ten girls) were included in this study. The results show that the highest genotype in the control group was AG (53.85%) followed by AA and GG (30.
... Show MoreThree different types of nozzles (different wear rate) were used in this study. They are classified depending on the severity of their wear to three groups: new, worn and damaged nozzles. Those nozzles were spraying with the same application rate (303 l/ha) on two-year field trials; this was achieved by changing the spraying pressure for each group of nozzles in order to get the same application rate. This practice is usually done by operators of sprayers, who calibrate the sprayers on the same application rate every year without changing the nozzles, so they tend to reduce the spraying pressure in order to compensate the flow rate increase due to the nozzles yearly wear. Two types of
In today’s competitive environment, organizational efficiency and sustained growth are crucial for survival. The performance of an organization is intricately connected to strategic planning, prompting firms to gather and leverage competitive information for a competitive advantage. Senior managers, recognizing this, initiate actions accordingly. This study aims to investigate the relationship between foresight, vision, strategic partnerships, motivation, system thinking, and organizational performance. Data, gathered through a self-administered questionnaire from various textile units, were analysed using structural equation modelling (SEM). The findings indicate that sub-constructs of strategic intelligence positively impact organizatio
... Show MoreA political perusal of Initiations in Declaring Middle East a District vacant of mass Destruction weapons
The fresh water ecosystem constitute an essential and very important for human life, for this reason it should be kept away from all the chemical pollutants including the pesticides The best way for Fighting harmful insects.(such as Anophles larvae) is by the biological control.
In the present study two species of Cyclopoida: Copepod, Mesocyclops hyalinus and Cyclops agilis آ were used as predators for Anophles larvae.
The data showed that the percentages of predation were 65% and 56%
forM. hyalinus and C. agilis respectively
and the means of predation were 1.3 larvae/ female and 1.1
... Show More<span lang="EN-US">In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, and industry. In this paper, the physical prototype of a proposed self-balancing platform that described the self-balancing attitude in the (X-axis, Y-axis, or biaxial) under the influence of road disturbance has been introduced. In the physical prototype, the inertial measurement unit (IMU) sensor will sense the disturbance in (X-axis, Y-axis, and biaxial). With the determined error, the corresponding electronic circuit, DC servo motors, and the Arduino software, the platform overcame the tilt angle(disturbance). Optimization of the proportional-integral-
... Show MoreWe consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More