This study has applied digital image processing on three-dimensional C.T. images to detect and diagnose kidney diseases. Medical images of different cases of kidney diseases were compared with those of healthy cases. Four different kidneys disorders, such as stones, tumors (cancer), cysts, and renal fibrosis were considered in additional to healthy tissues. This method helps in differentiating between the healthy and diseased kidney tissues. It can detect tumors in its very early stages, before they grow large enough to be seen by the human eye. The method used for segmentation and texture analysis was the k-means with co-occurrence matrix. The k-means separates the healthy classes and the tumor classes, and the affected parts were isolated from the healthy parts. To isolate the kidney from the other anatomical parts in a CT image, a mask must be generated, which is a binary image (0s or 1s). This mask was also utilized to remove undesired characteristics from the images. Density slicing was utilized to color the image based on its texture density. A slice is considered a band of neighboring gray levels in a gray scale image seen through monocular color. The gray scale band of (0-255) is transformed into a variety of color slices; it is the conversion of a gray scale image to a colored image that efficiently displays symmetric and diverse regions. Density slicing is a property process for segmentation. The unsupervised classification process, the K-Mean clustering, is used the application of K-mean on C.T. images to detect and classify the type of tumor in the kidney. The K-mean clustering separates each class depending on the texture properties and the distance from each class and color. This method of segmentation was used to separate the affected part from the healthy part of the tissue; the K-mean with Co-occurrence matrices gives statistical properties such as energy, homogeneity, contrast, and correlation. These give an indication of the nature of the tissues that are different in density. The standard deviation for the cancer was higher than the stone, so was the mean, the contrast and the correlation. This means that the texture of the cancer was brighter and has a none of grey level more than the stone and this can be seen from the energy value; the texture of the cancer was highly correlated. This method proved to be a good method for the early diagnosis.
The ground state densities of unstable proton-rich 9C, 12N and 23Al exotic nuclei are studied via the framework of the two-frequency shell model (TFSM) and the binary cluster model (BCM). In TFSM, the single particle harmonic oscillator wave functions are used with two different oscillator size parameters βc and βv, where the former is for the core (inner) orbits and the latter is for the valence (halo) orbits. In BCM, the internal densities of the clusters are described by single particle Gaussian wave functions. The long tail performance is clearly noticed in the calculated proton and matter density distributions of these nuclei. The structure of the valence proton in 9C and 12N is a pure (1p1/2) configuration while that for 23Al is
... Show MoreThis paper concerned with estimation reliability ( for K components parallel system of the stress-strength model with non-identical components which is subjected to a common stress, when the stress and strength follow the Generalized Exponential Distribution (GED) with unknown shape parameter α and the known scale parameter θ (θ=1) to be common. Different shrinkage estimation methods will be considered to estimate  depending on maximum likelihood estimator and prior estimates based on simulation using mean squared error (MSE) criteria. The study approved that the shrinkage estimation using shrinkage weight function was the best.
Abstract
An experimental study was conducted for measuring the quality of surface finishing roughness using magnetic abrasive finishing technique (MAF) on brass plate which is very difficult to be polish by a conventional machining process where the cost is high and much more susceptible to surface damage as compared to other materials. Four operation parameters were studied, the gap between the work piece and the electromagnetic inductor, the current that generate the flux, the rotational Spindale speed and amount of abrasive powder size considering constant linear feed movement between machine head and workpiece. Adaptive Neuro fuzzy inference system (ANFIS) was implemented for evaluation of a serie
... Show MoreAn analytical expression for the charge density distributions is derived based on the use of occupation numbers of the states and the single particle wave functions of the harmonic oscillator potential with size parameters chosen to reproduce the observed root mean square charge radii for all considered nuclei. The derived expression, which is applicable throughout the whole region of shell nuclei, has been employed in the calculations concerning the charge density distributions for odd- of shell nuclei, such as and nuclei. It is found that introducing an additional parameters, namely and which reflect the difference of the occupation numbers of the states from the prediction of the simple shell model leads to obtain a remarkabl
... Show MoreA laboratory experiment studied the effects of the green tea (Camellia sinensis L.) aqueous extract at concentrations of 10, 20, and 30 ppm on the germination and growth traits of the mung bean (Vigna radiata L.), carried out in 2021 at the Department of Biology, College of Education for Pure Sciences, Ibn Al-Haitham, University of Baghdad, Iraq. The results showed that Camellia sinensis green tea extracts played a vital role by significantly boosting all the examined characteristics compared with the control treatment. The aqueous extract of Green tea at concentrations of 10 and 20 ppm gave the best performance in increasing germination rates, germination speed, plant promoter indicator, and seedling strength compared with the control trea
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro
... Show MoreIn this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.
Exploration activities of the oil and gas industry generate loads of formation water called produced water (PW) up to thousands of tons each day. Depending on the geographic area, formation depth, oil production techniques, and age of oil supply wells, PW from different oil fields contain different chemical compositions. Currently, PW is also known as industrial waste water containing heavy metals that are toxic to humans and the environment, requiring special processing so that they can be disposed of in the environment. To determine the heavy metals content in PW from the Al-Ahdab oil field (AOF), the Ministry of Science and Technology/Agricultural Research Department determined som
Multiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show More