Given a binary matrix, finding the maximum set of columns such that the resulting submatrix has the Consecutive Ones Property (C1P) is called the Consecutive Ones Submatrix (C1S) problem. There are solution approaches for it, but there is also a room for improvement. Moreover, most of the studies of the problem use exact solution methods. We propose an evolutionary approach to solve the problem. We also suggest a related problem to C1S, which is the Consecutive Blocks Minimization (CBM). The algorithm is then performed on real-world and randomly generated matrices of the set covering type.
Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe
... Show MoreComet assay Single cell electrophoresis assay (SCGE) is a very sensitive method to determine DNA damage caused by exposure to mutagenic and carcinogenic and environmental agents that effect couples infertility. The aim of project was to evaluate DNA damage in males couples of females with recurrent spontaneous abortions. Forty males couples of females with unexplained recurrent spontaneous abortions and 25 healthy fertile males (control group) were evaluated for semen quality by conventional semen parameters, and alkaline comet assay was applied for the two groups. The results showed that patients male couples of females with RSA had a significant higher DNA damage than in the control group. It was concluded that patients male couples of
... Show MoreBackground:
Researchers have identified and defined β- approach normed space if some conditions are satisfied. In this work, we show that every approach normed space is a normed space.However, the converse is not necessarily true by giving an example. In addition, we define β – normed Banach space, and some examples are given. We also solve some problems. We discuss a finite β-dimensional app-normed space is β-complete and consequent Banach app- space. We explain that every approach normed space is a metric space, but the converse is not true by giving an example. We define β-complete and give some examples and propositions. If we have two normed vector spaces, then we get two properties that are equivalent. We also explain that
... Show MoreRecently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a
... Show MoreCOVID-19 affected the entire world due to the unavailability of the vaccine. The social distancing was a contributing factor that gave rise to the usage of Online Social Networks. It has been seen that people share the information that comes to them without verifying its source . One of the common forms of information that is disseminated that have a radical purpose is propaganda. Propaganda is organized and conscious method of molding conclusions and impacting an individual's contemplations to accomplish the ideal aim of proselytizer. For this paper, different propagandistic tweets were shared in the COVID-19 Era. Data regarding COVID-19 propaganda was extracted from Twitter. Labelling of data was performed manually using diffe
... Show MoreWriting in English is one of the essential factors for successful EFL learning .Iraqi students at the preparatory schools encounter problems when using their background knowledge in handling subskills of writing(Burhan,2013:164).Therefore, this study aims to investigate the 4thyear preparatory school students’ problems in English composition writing, and find solutions to these pro
... Show MoreBackground: He-Ne laser (632.8 nm) pre-irradiation may lead to modulate the damaging effects of ionizing radiation and decreasing in radiation damage on cells, by the induction of antioxidant defence mechanisms and accelerated the repair.
Objective: To study the protection properties of He-Ne laser (632.8 nm) pre-irradiation against UV light (253.7 nm) damage on human lymphocyte blood cells and its DNA.
Subject & Methods: 27 samples were processed only for lymphocyte blood cells separation, while a 45 samples for the extracted DNA from lymphocyte. The total of 72 sampleswere employed to evaluate the influence of He-Ne laser pre- irradiation against UV-light.
Results: The results showed that He-Ne laser (632.8 nm) pre-irradia