Medical Ultrasound (US) has many features that make it widely used in the world. These features are safety, availability and low cost. However, despite these features, the ultrasound suffers from problems. These problems are speckle noise and artifacts. In this paper, a new method is proposed to improve US images by removing speckle noise and reducing artifacts to enhance the contrast of the image. The proposed method involves algorithms for image preprocessing and segmentation. A median filter is used to smooth the image in the pre-processing. Additionally, to obtain best results, applying median filter with different kernel values. We take the better output of the median filter and feed it into the Gaussian filter, which then feeds the output of the Gaussian filter into histogram equalization to improve image visualization. The segmentation is done by thresholding and region growing segmentation. The value of threshold 128 was found to be better after we tested many values of thresholding. This value of thresholding combined with region growing gave accurate result segmentation of images. This paper demonstrates how image noise, artifacts and techniques were used effectively to improve image quality, and the analysis of performance of various techniques.
Background: Chronic obstructive pulmonary disease causes permanent morbidity, premature mortality and great burden to the healthcare system. Smoking is it's most common risk factor and Spirometry is for diagnosing COPD and monitoring its progression.
Objectives: Early detection of chronic obstructive pulmonary disease in symptomatic smokers’ ≥ 40years by spirometry.
Methods: A cross sectional study on all symptomatic smokers aged ≥ 40 years attending ten PHCCs in Baghdad Alkarkh and Alrisafa. Those whose FEV1/FVC was <70% on spirometry; after giving bronchodilator, were considered COPD +ve.
Results: Overall, airway obstruction was seen in
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreHemorrhagic insult is a major source of morbidity and mortality in both adults and newborn babies in the developed countries. The mechanisms underlying the non-traumatic rupture of cerebral vessels are not fully clear, but there is strong evidence that stress, which is associated with an increase in arterial blood pressure, plays a crucial role in the development of acute intracranial hemorrhage (ICH), and alterations in cerebral blood flow (CBF) may contribute to the pathogenesis of ICH. The problem is that there are no effective diagnostic methods that allow for a prognosis of risk to be made for the development of ICH. Therefore, quantitative assessment of CBF may significantly advance the underst
This paper is concerned with preliminary test single stage shrinkage estimators for the mean (q) of normal distribution with known variance s2 when a prior estimate (q0) of the actule value (q) is available, using specifying shrinkage weight factor y( ) as well as pre-test region (R). Expressions for the Bias, Mean Squared Error [MSE( )] and Relative Efficiency [R.Eff.( )] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants including in these expressions. Comparisons between suggested estimators with respect to usual estimators in the sense of Relative Efficiency are given. Furthermore, comparisons with the earlier existi
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
In our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.
Receipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. A
... Show MoreThis study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t
... Show More