The association of phytoplasma was investigated in symptomatic tomato (
For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MorePavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit
... Show MoreGlaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma d
HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
The study evaluated the recovery performance of any home herbs group as first aid in some emergency cases. The study involved 10 items of herbs (chamomile, black pepper, cloves, cinnamon, and anise) which used in acute cases such as cold, colic, inflammation of the intestine and tonsillitis, and (hibiscus, catnip, dried lime, cress seed, and ginger) were used for chronic cases such as hypertension, cardiovascular disease, and arthritis. The results showed the herbs had healing power and efficiency in the primary remedy for the above-mentioned diseases. The side effects, the contradictions, and the overdoses of these substances were discussed. It was concluded that home herbs could be used for treatment in emergency cases until moder
... Show MoreThe study aims to identify the Traumatic Symptoms (physiological, emotional, and cognitive) of earthquakes among the targeted sample; it also aims to identify the significant differences between psychological, emotional, and cognitive traumatic symptoms of earthquakes according to the gender and age of participants. The study additionally seeks to identify thepsychological positive-negative reactions associated with earthquakes according to gender and age of the participants. To measure the traumatic symptoms of earthquakes, a 4-point Likert scale questionnaire with (20) items (questions) accompanied with a 4-point Likert scale questionnaire with (18) items (questions) were used to measure the Psychological positive-n
... Show MoreA dust storm in Iraq is a climatic phenomenon common in arid and semi-arid regions . The frequency of the occurrence has increased drastically in the last decade and it is increasing continuously .Baghdad city like the rest of Iraq is suffering from the significant increase in dust storms . In this research , the study of the phenomenon of dust storms for all types (Suspended dust , rising dust , dust storm) , and its relationship with some climate variables (Temperature , rainfall ,wind speed) .The statement of the impact of climate change on this phenomenon to Baghdad station for the period (1981 – 2012) . Time series has been addressing the phenomenon of storms and cli
... Show MoreThe US invasion of Iraq in 2003 unleashed the repressed national aspirations of the Kurdish people. After the colonial powers, especially Britain, failed to establish a homeland of scattered Kurds in Iraq, Turkey, Syria and Iran, Iraq's Kurds managed to establish a semi-independent state in the north of the country Which lasted decades against the central authority in Baghdad in protest against what they call the forced integration of Kurds in the Iraqi state, and to obtain more rights and privileges as partners in this country. The federal region in the Kurdistan region of Iraq has become a reality, and it is eager not to strengthen its authority in return for the authority of the central government, but to annex other areas inhabited b
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More