New complexes of the [M(Ura)(Phen)(OH2)Cl2]Cl.2H2O type, where (Ura) uracil ; (Phen) 1,10-phenanthroline hydrate; M (Cr+3 , Fe+3 and La+3) were synthesized from mix ligand and characterized . These complexes have been characterized by the elemental micro analysis, spectral (FT-IR., UV-Vis, 1HNMR, 13CNMR and Mass) and magnetic susceptibility as well the molar conductive mensuration. Cr+3, Fe+3 and La+3- complexes of six–coordinated were proposed for the insulated for three metal(III) complexes for molecular formulas following into uracil property and 1,10-phenanthroline hydrate present . The proposed molecular structure for all metal (III) complexes is octahedral geometries .The biological activity was tested of metal(III) salts, ligands
... Show MoreNew complexes of the [M(Ura)(Phen)(OH2)Cl2]Cl.2H2O type, where (Ura) uracil ; (Phen) 1,10-phenanthroline hydrate; M (Cr+3 , Fe+3 and La+3) were synthesized from mix ligand and characterized . These complexes have been characterized by the elemental micro analysis, spectral (FT-IR., UV-Vis, 1HNMR, 13CNMR and Mass) and magnetic susceptibility as well the molar conductive mensuration. Cr+3, Fe+3 and La+3- complexes of six–coordinated were proposed for the insulated for three metal(III) complexes for molecular formulas following into uracil property and 1,10-phenanthroline hydrate present . The proposed molecular structure for all metal (III) complexes is octahedral geometries .The biological activity was tested of metal(III) salts, liga
... Show MoreIn order to obtain a mixed model with high significance and accurate alertness, it is necessary to search for the method that performs the task of selecting the most important variables to be included in the model, especially when the data under study suffers from the problem of multicollinearity as well as the problem of high dimensions. The research aims to compare some methods of choosing the explanatory variables and the estimation of the parameters of the regression model, which are Bayesian Ridge Regression (unbiased) and the adaptive Lasso regression model, using simulation. MSE was used to compare the methods.
Background: techniques of image analysis have been used extensively to minimize interobserver variation of immunohistochemical scoring, yet; image acquisition procedures are often demanding, expensive and laborious. This study aims to assess the validity of image analysis to predict human observer’s score with a simplified image acquisition technique. Materials and methods: formalin fixed- paraffin embedded tissue sections for ameloblastomas and basal cell carcinomas were immunohistochemically stained with monoclonal antibodies to MMP-2 and MMP-9. The extent of antibody positivity was quantified using Imagej® based application on low power photomicrographs obtained with a conventional camera. Results of the software were employed
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
High peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThis paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More