In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN), Convolutional Neural Network-Slanlet Transform (CNN-SLT) model uses Slanlet Transform (SLT). The CBIR system was therefore inspected and the outcomes benchmarked. The results clearly illustrate that generally, the recommended technique outdid the rest with accuracy of 89 percent out of the three datasets that were applied in our experiments. This remarkable performance clearly illustrated that the CNN-SLT method worked well for all three datasets, where the previous phase (CNN) and the successive phase (CNN-SLT) harmoniously worked together.
BACKGROUND: The degree of the development of coronary collaterals is long considered an alternate – that is, a collateral – source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty. OBJECTIVES: Our study explores the contribution of coronary collaterals – if any exist – while considering other potential predictors, including demographics and medical history, toward the left ventricular (LV) dysfunction measured through the LV ejection fraction (LVEF). METH
... Show MoreBackground: White spot lesions are esthetic problems caused by subsurface enamel demineralization that seen as white opacity. Aim of the study: This study aimed to evaluate and to compare the color change after the treatment of the white spot lesions with resin nϔtrton and micro abrasion. Materials and Methods: rtϔ white spot lesions were generated on 48 premolar teeth by the use of a demineralization solution. The teeth were randomly divided using the Diagnodent into three study groups (16 teeth for each group) depending on the depth of the induced lesions: outer enamel, inner enamel and outer dentine. Then each group was fatherly subdivided into two groups (8 teeth for each group) the ϔrst group was treated wit
... Show MoreAbstract
Purpose of this study is to investigate the relationship between Advertising Appeals, Attitudes toward Advertising, and Consumer Buying Behavior for Smart Phone The study was carried out on the students of Middle East University (MEU) In Amman- Jordan. A measurement scales with acceptable reliability and validity is developed to capture the dimensions of study variables. Four hypotheses were tested using Statistical package (SPSS-17). A two-step detailed statistical analysis of data was involved. First, descriptive statistics was performed to understand the underlying components of study variables; second, regression analysis and Path analysis using AMOS 7 were performed t
... Show MoreThe results of the analysis showed that there is a correlation between ISO 9001 and the competitive advantage, which shows that the implementation of ISO 9001 in the private colleges achieves a competitive advantage through its ability to employ the entrance of quality systems management according to ISO 9001, By focusing on improving the quality of its educational services in accordance with a clear and understandable policy for all and its ability to meet the expectations, expectations and wishes of students and beneficiaries, which leads to lower costs of operations compared to other colleges and achieve a higher level of reliability and quality and value of services provided and rapid respon
... Show MoreThis study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l
... Show MorePraise be to God, prayer and peace be upon the Messenger of Allah and after :
For the Holy Qur’an is the constitution of this nation, and it has included everything that the nation needs, and it has appropriate solutions for all the problems it faces, and for a long time the nation has its vision for the future, waiting for a leader who carries the concerns of this nation and proceeds towards progress and progress, so that it rises to the glory and glory. He brings it out from what it is today, from its deterioration in all levels.
The world has witnessed in recent decades the development of programs and curricula, and books have been prepared showing how to prepare leaders and their industry, and what programs they should adopt
The enhancement of the thermal and thermo-hydraulic performance of a semi-circular solar air collector (SCSAC) is numerically investigated using porous semi-circular obstacles made of metal foam with and without longitudinal porous Y-shaped fins. Two 10 and 40 PPI porous material samples are examined. Three-dimensional models are built to simulate the performance of SCSAC: model (I) with clear air passage; model (II) with only metal foam obstacles, and model (III) with metal foam obstacles as well as porous Y-fins. COMSOL Multiphysics software version 6.2 based on finite element methodology is employed. A conjugate heat transfer with a (k-ε) turbulence model is selected to simulate both heat transfer and fluid flow across the entir
... Show MoreThe research deal with three variables of exceptional importance to organization business firms. These variables are emotional intelligence, transformational leadership, and organizational performance. The aim of this research is to determine the effect of emotional intelligence and transformational leadership on organizational performance at the banking sector, which is represented by Al-Rafidain Bank. The problem of the research is expressed by many questions related with the nature of the interrelationships and effects among research’s variables. The researcher has depended upon the descriptions - analytical approach. on a random sample of (80 ) managers
... Show MoreIn this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper