In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
In this study, gamma-ray spectrometry with an HPGe detector was used to measure the specific activity concentrations of 226Ra, 232Th, and 40K in soil samples collected from IT1 oil reservoirs in Kirkuk city, northeast Iraq. The “spectral line Gp” gamma analysis software package was used to analyze the spectral data. 226Ra specific activity varies from 9 0.34 Bq.kg-1 to 17 0.47 Bq.kg-1. 232Th specific activity varies from 6.2 0.08 Bq.kg-1 to 18 0.2 Bq.kg-1. 40K specific activity varies from 25 0.19 Bq.kg-1 to 118 0.41 Bq.kg-1. The radiological hazard due to the radiation emitted from natural r
... Show MoreThe issue of the development of Qur'anic studies for the tasks, and the first thought of minds and multiple understandings, and the most precious ideas, and the alternatives were floated, and varied visions, especially as we live in an era exploding knowledge, and complicate secretions, and scramble his ideas, and to devise intellectual approaches To achieve the witnesses of civilization in the words of the Almighty (to be martyrs on the people) Surat Al - Baqarah / 143 attendance and participation in the achievement and a positive interaction with the participants of humanity and civilization in the light of the meaning (to know) rooms / 13.
Therefore, we must emerge from the one-dimensional view of the Koran to the complex mindset t
Biological drugs have an active substance that is made by a living organism or derived from a living organism. They are one of the important therapy options used in a wide range of diseases especially life-threatening diseases. Biological therapy opens new opportunities for treating different diseases for which drug therapy is minimal, but they have considerable differences in the safety consequences in comparison with non-biological drugs. The aim of the current study was to assess the post-marketing safety profile of biological drugs used in Iraqi hospitals by the analysis of the reported adverse drug reactions regarding their severity, seriousness, preventability, expectedness, and outcome. It is a retrospective study of the individu
... Show MorePetrophysical properties evaluation from well log analysis has always been crucial for the identification and assessment of hydrocarbon bearing zones. East Baghdad field is located 10 km east of Baghdad city, where the southern area includes the two southern portions of the field, Khasib formation is the main reservoir of East Baghdad oil field.
In this paper, well log data of nine wells have been environmentally corrected, where the corrected data used to determine lithology, shale volume, porosity, and water saturation. Lithology identified by two methods; neutron-density and M-N matrix plots, while the shale volume estimated by single shale indicator and dual shale indicator, The porosity is calculated from the three common po
... Show MoreNasiriya field is located about 38 Km to the north – west of Nasiriya city. Yammama, a giant lower cretaceous reservoir in Nasiriya field which is lithologically formed from limestone. Yammama mainly was divided into three main reservoir units YA, YB1, YB2 and YB3 and it is separated by impermeable layers of variable thickness. An accurate petro physical evolution of the reservoir is of great importance perform an excellent geological model so that four petro physical properties which are shale volume, porosity, water saturation and permeability was re-evaluated. The volume of shale was calculated using the density and neutron logs (VSH-DN) rather than using gamma ray log because of presence a uranium content in the formation that make
... Show MoreThis paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show More