Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, coronal plane, and sagittal plane. Three different thresholds, which are based on texture features: mean, energy and entropy, are obtained automatically. This allowed to accurately separating the MRI slice into normal and abnormal one. However, the abnormality detection contained some normal blocks assigned wrongly as abnormal and vice versa. This problem is surmounted by applying the fine-tuning mechanism. Finally, the MRI slice abnormality detection is achieved by selecting the abnormal slices along its tumour region (Region of Interest-ROI).
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreThis study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph
... Show MoreAssessment of annual wind energy potential for three selected sites in Iraq has been analyzed in the present work. The wind velocities data from August 2014 to July 2015 were collected from the website of Weather Underground Organization (WUO) at stations elevation (35m, 32m, and 17m) for Baghdad, Najaf, and Kut Al-Hai respectively. Extrapolation of stations elevation and wind velocities was used to estimate wind velocities at (60m, 90m, and 120m). The objectives are to analyze the wind speed data and assess the wind energy potential for wind energy applications. Computer code for MATLAB software has been developed to solve the mathematical model. The results are presented as a monthly and annual average for wind velocities, standard deviat
... Show MoreIn this paper we reported the microfabrication of three-dimensional structures using two-photon polymerization (2PP) in a mixture of MEH-PPV and an acrylic resin. Femtosecond laser operating at 800nm was employed for the two-photon polymerization processes. As a first step in this project we obtained the better composition in order to fabricate microstructers of MEH-PPV in the resin via two-photon polymerzation. Acknowledgement:This research is support by Mazur Group, Harvrad Universirt.
The fractional order partial differential equations (FPDEs) are generalizations of classical partial differential equations (PDEs). In this paper we examine the stability of the explicit and implicit finite difference methods to solve the initial-boundary value problem of the hyperbolic for one-sided and two sided fractional order partial differential equations (FPDEs). The stability (and convergence) result of this problem is discussed by using the Fourier series method (Von Neumanns Method).
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More