Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w
... Show MoreThe process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method
... Show MoreThe computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.
Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,
... Show MoreThis researchpaper includes the incorporation of Alliin at various energy levels and angles
With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b
... Show MoreThe research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.
The cuneiform texts considered one of the most important resources which play an important role , wich help us to know how was the economic , politic and religious conditions , and everything related of the history of Mesopotamia , which contain many of information that enrich our knowldgement about Mesopotamia civilization , since using writing as away to documentation the science and human knowldgement . In this research we studied four cuneiform texts, which confiscated and keeped in the Iraq museum , all of these are economic texts , the content of three of them are loans, are take the numbers (IM.206972- IM.163718-IM.163808-), the fourth text is the text of income which take the number (IM.163182). therefore , We will talk about what l
... Show MoreThis paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application
... Show MoreFor many years, the construction industry damages have been overlooked such as unreasonable consumption of resources in addition to producing a lot of construction waste but with global awareness growth towards the sustainable development issues, the sustainable construction practices have been adopted, taking into account the environment and human safety. The research aims to propose a management system for construction practices which could be adopted during constructing different types of sustainable buildings besides formulating flowcharts which clarify the required whole phases of sustainable buildings life cycle. The research includes two parts: theoretical part which generally ,handles the sustainability concepts at construction i
... Show MoreSub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim
... Show More