This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that the
proposedmethod obtained very good results but it requires more testing on different types of Skin
Cancer Images.
Chlopheniramine maleate ( CPM ) , is one of the H- receptor antagonist , widely used in allergic diseases ,like skin rash and pruritis .CPM 3%w/w was successfully loaded in 2%w/w sodium alginate (SA) as a gel base , and to be considered as a selected formula .It was found that the diffusion of CPM through the skin of albino rat was increased as the concentration of CPM increased from 2 %w/w sodium alginate , More
... Show MoreThe process involved isolating E. faecium from the gut of honeybees, screening the bacterium for bacteriocin-like inhibitory substance (BLIS), evaluating its impact on the expression of the mexA gene in multidrug-resistant (MDR) P. aeruginosa, and determining the role of bacteriocin in treating infected wounds in mice through histopathological examination. After evaluating the best circumstances for producing BLIS, it was discovered that glucose was a superior carbon source and yeast extract was the best source of nitrogen. The pH was found to be 5, the ideal incubation time was 72 hours, and ammonium sulfate salt was used for partial purification at 80% saturation. The identification of MDR P. aeruginosa isolates from pus infection
... Show MoreIn this research, the seasonal Optimal Reliable Frequency (ORF) variations between different transmitter/receiver stations have been determined. Mosul, Baghdad, and Basra have been chosen as tested transmitting stations that located in the northern, center, and southern of Iraqi zone. In this research, the minimum and maximum years (2009 and 2014) of solar cycle 24 have been chosen to examine the effect of solar activity on the determined seasonal ORF parameter. Mathematical model has been proposed which leads to generate the Optimal Reliable Frequency that can maintain the seasonal connection links for different path lengths and bearings. The suggested ORF parameter represented by a different orders polynomial equation. The polynom
... Show Moreجهن آشبيري ىه شاعر ما بعد الحداثة كتب قريدة " صهرة شخرية في مرآة محدبة " في عام .3791 يعد الفن والتأمل الذاتي عنررين ميمين في األدب ، كما تم تقديمو في قريدة آشبيري ، وتبين أن نيجو النقدي تجاه الفن والتأمل الذاتي كان مركز جذب من عقهل ما بعد الحداثة خالل عرره ، الذي انخرط في نقد عمل آشبيري بدبب طبيعتو المربكة أو كتابتو. إحدى سمات شعراء ما بعد الحداثة ىي انخراطيم في االنعكاسية الذاتية والتناص. من خالل ىذه العناصر ، ينقل
... Show MoreAbstract: E2F6 is a member of the E2F family of transcription factors involved in regulation of a wide variety of genes through both activation and repression. E2F6 has been reported as overexpressed in breast cancers but whether or not this is important for tumor development is unclear. We first checked E2F6 expression in tumor cDNAs and the protein level in a range of breast cancer cell lines. RNA interference-mediated depletion was then used to assess the importance of E2F6 expression in cell lines with regard to cell cycle profile using fluorescence-activated cell sorting and a cell survival assay using (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT). The overexpression of E2F6 was confirmed in breast tumor cDNA samp
... Show MoreThe logistic regression model is one of the oldest and most common of the regression models, and it is known as one of the statistical methods used to describe and estimate the relationship between a dependent random variable and explanatory random variables. Several methods are used to estimate this model, including the bootstrap method, which is one of the estimation methods that depend on the principle of sampling with return, and is represented by a sample reshaping that includes (n) of the elements drawn by randomly returning from (N) from the original data, It is a computational method used to determine the measure of accuracy to estimate the statistics, and for this reason, this method was used to find more accurate estimates. The ma
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More