Ultrasound has been used as a diagnostic modality for many intraocular diseases, due its safety, low cost, real time and wide availability. Unfortunately, ultrasound images suffer from speckle artifact that are tissue dependent. In this work, we will offer a method to reduce speckle noise and improve ultrasound image to raise the human diagnostic performance. This method combined undecimated wavelet transform with a wavelet coefficient mapping function: where UDWT used to eliminate the noise and a wavelet coefficient mapping function used to enhance the contrast of denoised images obtained from the first component. This methods can be used not only as a means for improving visual quality of medical images but also as a preprocessing module for computer-aided detection/diagnosis systems to improve the performance of screening and detecting regions of interest in images. The proposed method is experimentally evaluated via 60 ultrasound images of eye. It is demonstrated that the proposed method can further improve the image quality of ocular ultrasound; the results reveal the effectiveness and superiority of the proposed method.
This study aims to characterize traumatic spinal cord injury (TSCI) neurophysiologically using an intramuscular fine-wire electromyography (EMG) electrode pair. EMG data were collected from an agonist-antagonist pair of tail muscles of Macaca fasicularis, pre- and post-lesion, and for a treatment and control group. The EMG signals were decomposed into multi-resolution subsets using wavelet transforms (WT), then the relative power (RP) was calculated for each individual reconstructed EMG sub-band. Linear mixed models were developed to test three hypotheses: (i) asymmetrical volitional activity of left and right side tail muscles (ii) the effect of the experimental TSCI on the frequency content of the EMG signal, (iii) and the effect
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreImage texture is an important part of many types of images, for example medical images. Texture Analysis is the technique that uses measurable features to categorize complex textures. The main goal is to extract discriminative features that are used in different pattern recognition applications and texture categorization. This paper investigates the extraction of most discriminative features for different texture images from the “Colored Brodatz” dataset using two types of image contrast measures, as well as using the statistical moments on five bands (red, green, blue, grey, and black). The Euclidean distance measure is used in the matching step to check the similarity degree. The proposed method was tested on 112 classes o
... Show MoreImage Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show MoreInformation processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (
... Show MoreIn this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis
... Show MoreIt is well known that monotherapy does not provide therapeutic response in all hypertensive. Somepatients show an excellent response, while in others there is a poor response. Combinationantihypertensive therapy is administered when blood pressure is inadequately controlled bymonotherapy to achieve a balanced and additive antihypertensive effect with minimum adverse effects.Both angiotensin converting enzyme (ACE) inhibitors and dihydropyridine type of calcium antagonistsare well established and widely used in monotherapy. An understanding of differences in themechanism of action of these agents allows a logical approach for the use of these agents as acombination therapy. This study was designed to evaluate the possible beneficial
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreE. coli was isolated, and it was Gram-negative rod bacteria that was colony circular, regular edged, thick somewhat glitter and viscous(less). It was lactose fermenter bacteria and belongs the family of Enterobacteriaceae. E. coli showed sensitivity to all used antibiotics except Erythromycin (E), Cloxacellin (CX), Rifampin (RA), Cephalothin (KF), Ampicillin (AM), and Penicillin (P). The experimental results of antibiotic sensitivity of E. coli in media containing different concentrations of omeprazole, a proton pump inhibitor, showed an enhancement of resistance by decreasing the sensitivity of E. coli inversely with drug concentration against the antibiotics that E. coli was sensitive to. It seems that omeprazole changed cell mem
... Show More