Corona Virus Disease-2019 (COVID-19) is a novel virus belongs to the corona virus's family. It spreads very quickly and causes many deaths around the world. The early diagnosis of the disease can help in providing the proper therapy and saving the humans' life. However, it founded that the diagnosis of chest radiography can give an indicator of coronavirus. Thus, a Corner-based Weber Local Descriptor (CWLD) for COVID-19 diagnostics based on chest X-Ray image analysis is presented in this article. The histogram of Weber differential excitation and gradient orientation of the local regions surrounding points of interest are proposed to represent the patterns of the chest X-Ray image. Support Vector Machine (SVM) and Deep Belief Network (DBN) classifiers are utilized for CWLD classification. Experimental results on a real chest X-Ray database showed that the gradient orientation gives the desired accuracy which is 100% using DBN classifier and CWLD size equals to 400.
The study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app
... Show MoreIn the present work, it had been measured the concentration of radon gas (CRn) for (10) samples of cement used in constructions before and after painting them using enamel paint, purchased from the local markets, to see the extent of its ability to reduce emissions of Rn-222 in the air. These samples were obtained from different sources available in the local markets in Baghdad and other provinces. The measurements were done by the American-made detector (RAD7). The results showed that the highest CRn in the air emitted from cement samples after coating was in the cement sample (Iranian origin) where the concentration was (58.27 Bq/m3) while the lowest CRn was found in building material samples
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More