This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that the
proposedmethod obtained very good results but it requires more testing on different types of Skin
Cancer Images.
Through this descriptive study of the image of the Islamic Republic of Iran in the independent Iraqi press, the researcher relies on surveys, content analysis, and observation tools. The research community selected was the Iraqi independent press, represented by the Al-Zaman, Al-Dustour, and Al-Mada newspapers. The researcher adopts the comprehensive inventory method for newspaper issues produced between October 2019 and January 2020.
The results of this study show that Iran's interference in Iraq's internal affairs was one of the most prominent components of the picture that independent Iraqi newspapers seek to paint about the Islamic Republic of Iran.
Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreIn this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.
Pemphigus vulgaris is an autoimmune disease of the skin and mucous membrane. Renal transplantation is a common procedure in
To study the frequency of skin tumors and infections in patients with pemphigus vulgaris compared with renal transplant recipients and normal controls.
One hundred kidney transplant recipients, their ages ranged from 14 to 70 (46.65 ± 4.74) years
Recognizing speech emotions is an important subject in pattern recognition. This work is about studying the effect of extracting the minimum possible number of features on the speech emotion recognition (SER) system. In this paper, three experiments performed to reach the best way that gives good accuracy. The first one extracting only three features: zero crossing rate (ZCR), mean, and standard deviation (SD) from emotional speech samples, the second one extracting only the first 12 Mel frequency cepstral coefficient (MFCC) features, and the last experiment applying feature fusion between the mentioned features. In all experiments, the features are classified using five types of classification techniques, which are the Random Forest (RF),
... Show MoreThe research aims to study and definition of the concept of creative accounting and motives adopted by the management of companies to achieve their own goals and their impact on the reliability of the financial statements and the tax settling accounts and whether that tax administration is able to detect and limit the creative accounting practices and impose legal sanctions deterrent against companies The research has come to a set of conclusions, including:
- The administration motives in the use of creative accounting methods, some internal motives related to the interests of the administration in maximizing profits to increase incentives and rewards, others are external, such as the impact on stock prices or reduce the am
One of the most important enhanced oil recoveries methods is miscible displacement. During this method preferably access to the conditions of miscibility to improve the extraction process and the most important factor in these conditions is miscibility pressure. This study focused on establishing a suitable correlation to calculate the minimum miscibility pressure (MMP) required for injecting hydrocarbon gases into southern Iraq oil reservoir. MMPs were estimated for thirty oil samples from southern Iraqi oil fields by using modified Peng and Robinson equation of state. The obtained PVT reports properties were used for tunning the equation of state parameters by making a match between the equation of state results with experimenta
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More