Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. Accurate estimation of kidney tumor volume is essential for clinical diagnoses and therapeutic decisions related to renal diseases. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors that addresses the challenges of accurate kidney tumor volume estimation caused by extensive variations in kidney shape, size and orientation across subjects.
In this paper, have tried to implement an automated segmentation method of gray level CT images. The segmentation process is performed by using the Fuzzy C-Means (FCM) clustering method to detect and segment kidney CT images for the kidney region. The propose method is started with pre-processing of the kidney CT image to separate the kidney from the abdomen CT and to enhance its contrast and removing the undesired noise in order to make the image suitable for further processing. The resulted segmented CT images, then used to extract the tumor region from kidney image defining the tumor volume (size) is not an easy task, because the 2D tumor shape in the CT slices are not regular. To overcome the problem of calculating the area of the convex shape of the hull of the tumor in each slice, we have used the Frustum model for the fragmented data.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>) below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are
... Show MoreAbstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More
The resort to the eloquence of the poetic image as a style reveals the poet's creativity and creativity in dealing with external influences, and reflect them with emotional images express a sense of intense emotional imagination, and this imagination stems from the experience of a poetic sense of truth, tasted by the recipient before the creator of the poetic text.
Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreMicrobial activity of Ellagic acid when mixed with some types of candy toward Streptococcus mutans microorganism was studied. The main purpose of carrying out this study is to produce a new type of candy that contains Ellagic acid in addition to xylitol instead of sucrose to prevent dental caries. The results show that the inhibitory action of Ellagic acid was more effective when mixed with this type of candy for the purpose of reducing Streptococcus mutans microorganisms, while sensory evaluation was applied in this study to 20 volunteers to that candy sample evaluated which contain (5 mg/ml) Ellagic acid with 100g xylitol to determine consumers acceptability of this sample of candy. The results were expressed as mean value, slandered d
... Show More