This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that the
proposedmethod obtained very good results but it requires more testing on different types of Skin
Cancer Images.
Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject
... Show MoreMy study here is about the (possible for itself) features especially in the (Alashaira) opinion, also I touch to the other logicians opinions, I clarified these features concisely in the preface to be clear in front of the reader, I made it in two studies and five subjects.I talked about the meaning of the existence in the ((possible for itself) theme, and I clarified its types in the logicians and the philosophers' opinions, through which the existence and the nonexistence are equal in it, as it cannot be existed nor be nonsexist unless with a separated reason, and there is no necessity to oblige its existence, or its nonexistence is impossible.Then I talked about the outweighing of the (possible for itself) as one side of the exi
... Show MoreThe atomic properties have been studied for He-like ions (He atom, Li+, Be2+ and B3+ions). These properties included, the atomic form factor f(S), electron density at the nucleus , nuclear magnetic shielding constant and diamagnetic susceptibility ,which are very important in the study of physical properties of the atoms and ions. For these purpose two types of the wave functions applied are used, the Hartree-Fock (HF) waves function (uncorrelated) and the Configuration interaction (CI) wave function (correlated). All the results and the behaviors obtained in this work have been discussed, interpreted and compared with those previously obtained.
The quality and cost of constructed buildings are heavily influenced by the performance of design/auditing consultants. Thus, selecting the right design consultant and design auditing consultants is of utmost importance and not an easy task for any construction client. so, the client should specify the efficiency criteria and assess the performance levels of the design and design auditing consultant firm. The study aims to identify the selection criteria of the design consultant in construction projects and also identify the selection criteria of the design auditing consultant for the construction projects by using the Delphi survey with applying the principal components analysis (PCA
The current research aims at detecting Brain Dominance Learning Styles distinguished
and ordinary secondary school students (males and females).The researcher adopted Torrance
measure, known as ‘the style of your learning and thinking to measure Brain Dominance
Learning Styles’, the codified version of Joseph Qitami (1986); picture (a). The researcher
verified the standard properties of tool. The final application sample was 352 distinguished
and ordinary students; 176 distinguished male and female students and 176 ordinary male and
female students at the scientific fifth level of secondary school from schools in the province of
Baghdad, AL- KarKh Education Directorates in the First and Second . and who have been
In this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr
... Show MoreThe use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 fro
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More