Contours extraction from two dimensional echocardiographic images has been a challenge in digital image processing. This is essentially due to the heavy noise, poor quality of these images and some artifacts like papillary muscles, intra-cavity structures as chordate, and valves that can interfere with the endocardial border tracking. In this paper, we will present a technique to extract the contours of heart boundaries from a sequence of echocardiographic images, where it started with pre-processing to reduce noise and produce better image quality. By pre-processing the images, the unclear edges are avoided, and we can get an accurate detection of both heart boundary and movement of heart valves.
The research material was prune plums (
This study intends to examine the efficiency of student-centered learning (SCL) through Google classroom in enhancing the readiness of fourth stage females’ pre-service teachers. The research employs a quasi-experimental design with a control and experimental group to compare the teaching readiness of participants before and after the intervention. The participants were 30 of fourth stage students at the University of Baghdad - College of Education for Women/the department of English and data were collected through observation checklist to assess their teaching experience and questionnaires to assess their perceptions towards using Google Classroom. Two sections were selected, C as a control group and D as the experimental one each with (
... Show MoreThe research material was prune plums (
Time crosses one of the most important principles that are agreed upon in contracts, because the temporal dimension has a significant impact on all contract provisions and is not limited to a certain group of them. French and Arab legal jurists alike called for this dimension to be given special attention. That is the term of the contract term; To try to limit the temporal elements, clarify their provisions and distinguish between them, but in the Arab world it did not receive the same attention that it received in the West.
The pharmacophore 2-aminothiazole has an interesting role in pharmaceutical chemistry as this led to the synthesis of many types of compounds with diverse biological activity. Schiff base derivatives at the same time contribute to drug evolution importantly. In this review, the Schiff base derivatives of 2-aminothiazole formed and some of their metal complexes are being focused on, and the antimicrobial and anticancer activity of them is being illustrated.
There are main methods of scientific research, and that the researcher's choice of the appropriate methodology for scientific research is one of the most important rules on which the researcher must rely in order to prepare scientific research properly. There is no doubt that the methodology of scientific research is of great importance that they all agree on the preparation of accurate scientific research. Scientific research is an organized research that does not come by chance, but comes as a result of the activity of the mind. It is theoretical because it relies on theories for the purposes of perceiving the proportions and relationships between things, and everyone is subjected to testing and experiment.
The pharmacophore 2-aminothiazole has an interesting role in pharmaceutical chemistry as this led to the synthesis of many types of compounds with diverse biological activity. Schiff base derivatives at the same time contribute to drug evolution importantly. In this review, the Schiff base derivatives of 2-aminothiazole formed and some of their metal complexes are being focused on, and the antimicrobial and anticancer activity of them is being illustrated.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe research aims to identify the availability of some basic competencies that are required to be available to workers in digital agricultural Extension from the point of view of senior management, middle management, and, employees with Post-graduate education degrees, represented by the following: Transition to digital agricultural Extension for sustainable and smart family farms, benefiting from international expertise and experiences in applying for Digital agricultural Extension, preparing and implementing Extension messages through platforms, factors affecting the effectiveness of digital agricultural Extension and its platforms, following up and evaluating the activities and programs of the digital Extension platform. The research pop
... Show More