Detection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreA method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results hav
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreIt is more beneficial science and created and the highest honor is the Koran Sciences, God has honored research in this fun science, came this research that shed the light on the radical incision, and Naughty derivatives as contained in the Koran, and illustrate the diversity of Saghma morphological, and fork them from derivatives what it entailed connotations, as well as the evacuation of cryptic in some of these verses from the biological secrets take minds newly exposed Anitrjt science under the name of scientific miracles.
The research methodology is revenue verse which included the word, and revenue lexical meaning and its meaning in the context of the Qur'an, and reflect the views of the commentators of the verse, and then the r
Separation of Trigonelline, the major alkaloid in fenugreek seeds, is difficult because the extract of these seeds usually contains Trigonelline, choline, mucilage, and steroidal saponins, in addition to some other substances. This study amis to isolate the quaternary ammonium alkaloid (Trigonelline) and choline from fenugreek seeds (Trigonella-foenum graecum L.) which have similar physiochemical properties by modifying of the classical method. Seeds were defatted and then extracted with methanol. The presence of alkaloids was detected by using Mayer's and Dragendorff's reagents. In this work, trigonilline was isolated with traces of choline by subsequent processes of purification using analytical and preparative TLC techniques.
... Show MoreFor extraction chloro anion complexes of Cd2+ and Hg2+ used many organic agents as extractant according to liquid ion exchange method such as α-Naphthyl amine (α-NA), 4-Amino benzoic acid (4-ABA), 2-[(4-Carboxy methyl phenyl) azo]-4,5-diphenyl imidazole (4CMePADPI) and Cryptand (C222). This study includes definition hydrochloric acid concentration in aqueous phase and shaking with organic phase necessary for extraction as well as shaking time, organic solvent effect, interferences and alkaline salt effect. Thermodynamic showed the ion exchange reaction was exothermic for α-NA, C222 and endothermic for 4-ABA, 4-CMePADPI for extraction CdCl4=, but for extraction HgCl4= was exothermic with 4-ABA, 4CMePADPI and C222 but
... Show MoreThis study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.
Time series analysis is the statistical approach used to analyze a series of data. Time series is the most popular statistical method for forecasting, which is widely used in several statistical and economic applications. The wavelet transform is a powerful mathematical technique that converts an analyzed signal into a time-frequency representation. The wavelet transform method provides signal information in both the time domain and frequency domain. The aims of this study are to propose a wavelet function by derivation of a quotient from two different Fibonacci coefficient polynomials, as well as a comparison between ARIMA and wavelet-ARIMA. The time series data for daily wind speed is used for this study. From the obtained results, the
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreConsidering the science of speech in the light of its purposes is an accurate scientific study that looks at it from its reality in which it originated, and its topic that it dealt with and its goals that it sought, and it follows its main course in the directions of approving the belief and inferring it, and repelling the objections to it, and this study comes to show the realism of the science of speech in its emergence Its subject and method, since its launch was from the reality of the Islamic nation and based on its intellectual needs, so its presence was necessary in the life of the Islamic nation because of its role in facing the challenges faced by the Islamic faith, and the dangers it was exposed to as a result of the intellectu
... Show More