Although the number of stomach tumor patients reduced obviously during last decades in western countries, but this illness is still one of the main causes of death in developing countries. The aim of this research is to detect the area of a tumor in a stomach images based on fuzzy clustering. The proposed methodology consists of three stages. The stomach images are divided into four quarters and then features elicited from each quarter in the first stage by utilizing seven moments invariant. Fuzzy C-Mean clustering (FCM) was employed in the second stage for each quarter to collect the features of each quarter into clusters. Manhattan distance was calculated in the third stage among all clusters' centers in all quarters to disclosure of the quarter that contains a tumor based on the centroid value of the cluster in this quarter, which is far from the centers of the remaining quarters. From the calculations conducted on several images' quarters, the experimental outcomes show that the centroid value of the cluster in each quarter was greater than 0.9 if this quarter did not contain a tumor while the value of the centroid value for the cluster containing a tumor was less than 0.4.For examples, in a quarter no.1 for STOMACH_1 medical image, the centroid value of the cluster was 0.973 while the value of the cluster centroid in quarter no.3 was 0.280. For this reason the tumor area was found in quarter no.(3) of the medical image STOMACH_1. Also, the centroid value of the cluster in a quarter no.2 was 0.948 for STOMACH_2 while, the value of the cluster centroid in quarter no.4 was 0.397. For this reason the tumor area was found in a quarter no.4 of the medical image STOMACH_2.
In The Name of Allah Most Gracious Most Merciful
Cheating is one of the forbidden actions and reprehensible morals that are forbidden by Islamic law, because it involves an assault on rights, whether they are the rights of God Almighty or the rights of God.
people, or self-rights, and because it involves harming others.
Since the Sunnah of the Prophet is the second source of Islamic law, many of the noble hadiths of the Prophet forbid and prohibit cheating.
This study sheds light on it.
Shapes have differed in terms of their temporality, tools, technical variations, aesthetic functions and dimensions. The beginnings started with manual primitive techniques that have played an a significant artistic role in the ancient civilizations, then developed with the technological development and the digital technologies that encompassed various programs and specialist means in the graphic design, so that its visual outputs in the textbook that is considered a communication means that has an effect and attracts the recipient. That is what made the researcher search and investigate this topic describing the research problem as follows: What are the shapes as alternatives to the words in the design of the textbook? The research obje
... Show MoreUntil The Second Half Of Nineteenth Century , Psychology Depended On Philosophy In Its Experiences Which Means It Depend On Individuals Feelings Toward Psychological Experiences And Rapid Observation . As For The Scientific Organized Experimentation And Observation By Machines Have Been Used Later .
The Experimentation Looking For The Cause Of Phenomena And How Is That Happened Also Reveal The Causal Relationship Between Among Phenomena . The Experiences In Psychology Field Include In Its Simplest Form Only One Variable ( Effective) Which Is Called Independent Variable As Well As Another Variable ( Affected ) That Called Dependent Variable .
... Show MoreAbstract:
The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year . The research examines the use of
... Show MoreA histological study showed the wall of the stomach in Pica pica and Herpestes javanicus consists of four layers: mucosa, submucosa, muscularis externa and serosa. Also, the present study showed many differences in the histological structures of the stomach for each in both types. The stomach of P. pica consists of two portions: the proventiculus and gizzard, while the stomach of H. javanicus consists of three portions: cardiac, fundic and pyloric regions. The mucosa layer formed short gastric folds, named plicae. In the proventiculus of P. pica, sulcus is found between each two plicae, but the folds called gastric pits in the gizzard, which are full with koilin. Lamina properia in both types contained gastric g
... Show MoreRadon is the most dangerous natural radioactive component affecting the human population, since it is a radioactive gas that results from the decomposition process of uranium deposits in soil, rocks, and water, and it is damaging both humans and the ecosystem. The radon concentrations and exhalation rate in soil samples from various locations were determined using a passive approach with a CR-39 (CR-39 is Columbia Resin #39; it is allyl diglycol carbonate C12H18O7) detector in Amiriya region in Baghdad Governorate. The average values of radon concentrations are ranged from 47.3 to 54.2 Bq·m−3. From the obtained results, we can conclude that the values of all studied locations are
Despite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit
... Show MoreThis research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show More"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas stegano