Researchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The classifiers utilized in our study are Support Vector Machine (SVM) and Decision Trees classification accuracy was achieved 90% and 87.5%, respectively of detecting Keratoconus corneas. The features were extracted by using the Matlab (R2011 and R 2017) and Orange canvas (Pythonw).
In this work, a weighted H lder function that approximates a Jacobi polynomial which solves the second order singular Sturm-Liouville equation is discussed. This is generally equivalent to the Jacobean translations and the moduli of smoothness. This paper aims to focus on improving methods of approximation and finding the upper and lower estimates for the degree of approximation in weighted H lder spaces by modifying the modulus of continuity and smoothness. Moreover, some properties for the moduli of smoothness with direct and inverse results are considered.
Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th
... Show Moreتستخدم تقنيات التصنيفِ ًبصورة واسعة جدا في كثير من المجالات التطبيقية. ولاسيما في المجالات الاقتصادية والتحليلات المالية كما في عِلْمِ تحليل الزبونِ التنبؤيِpredictive customer analytics ، الذي يتضمن ذلك الإمتلاكِ، المقايضة، إحتكار وإحراز الإئتمانِ والجباياتِ. إنّ هدفَ أيّ نموذج تصنيفِ هو أَنْ يُصنّفَ َ المشاهدات في مجموعتين أَو أكثرِ للوصول الى التنبؤ بنتيجةً ترتبط بكُلّ مشاهدة ومثا
... Show MoreThis research aims to explore the impact of strategic intelligence by his dimensions (Foresight , system thinking, vision, motivation and partnership) on decision making styles which represented by ( rational, intuitive, dependent, Spontaneous and Avoidant style) for a sample of the administrative leaders in the center of Reconstruction &Housing Ministry and Some its formations which are companies of (Sa'ad, Al Mansour, al Farouq, Assyria, al-Mu'tasim, al- Rasheed, and Public Authority for Housing). So to achieve the research objectives and to test hypotheses, it has been relying
... Show MoreGypseous soils are spread in several regions in the world including Iraq, where it covers more than 28.6% [1] of the surface region of the country. This soil, with high gypsum content causes different problems in construction and strategic projects. As a result of water flow through the soil mass, permeability and chemical arrangement of these soils vary over time due to the solubility and leaching of gypsum. In this study the soil of 36% gypsum content, is taken from one location about 100 km (62 mi) southwest of Baghdad, where the sample is taken from depth (0.5 - 1) m below the natural ground surface and mixed with (3%, 6%, 9%) of Copolymer and Styrene-butadiene Rubber to improve t
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreThis work focused on principle of higher order mode excitation using in- line Double Clad Multi-Mode Mach-Zehnder Interferometer (DC-MM-MZI). The DC-MM-MZI was designed with 50 cm etched MMF. The etching length is 5cm. The tenability of this interferometer was studied using opt grating ver.4.2.2 and optiwave
ver. 7 simulator. After removing (25, 35, 45, 55) μm from MMF and immersing this segment of MMF with water bath contained distilled water and ethanol, in addition to, air. Pulsed laser source centered at 1546.7nm ,pulse width 10ns and peak power 1.33mW was propagated via this interferometer Maximum modes were obtained in case of air surrounded media which are 9800 and 25 um removed cladding layer, with peak power 49.800 m
The goal (purpose) from using development technology that require mathematical procedure related with high Quality & sufficiency of solving complex problem called Dynamic Programming with in recursive method (forward & backward) through finding series of associated decisions for reliability function of Pareto distribution estimator by using two approach Maximum likelihood & moment .to conclude optimal policy
A total of 96 stool samples were collected from children with bloody diarrhea from two hospitals in Baghdad. All samples were surveyed and examined for the presence of the Escherichia coli O157:H7 and differentiate it from other Non -Sorbitol Fermenting Escherichia coli (NSF E. coli). The Bacterial isolates were identifed by using morphological diagnostic methods, Samples were cultured on liquid enrichment medium, incubated at 37C? for 24 hrs, and then cultured on Cefixime Tellurite -Sorbitol MacConkey Agar (CT- SMAC). 32 non-sorbitol fermenting bacterial isolates were obtained of which 11 were identified as Escherichia coli by using traditional biochemical tests and API20E diagnostic system without differentiation between
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show More