This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that the
proposedmethod obtained very good results but it requires more testing on different types of Skin
Cancer Images.
For poets to pay a great attention to the Islamic figures and their symbolism in Islam come as a prominent phenomenon in our literature . As there is an impact of them on the brilliant history commemorated by littérateurs . As a matter of fact ، the chronicle of Imam Ali Ibin Abi Talib (peace be upon him) falls in the orbit of the focus Ibn Abi Al-Hadid Al-Mu'tazili steers to in his poems . The current research study is to trace the portrayal of Imam Ali (peace be upon them) in the poetry of Ibn Abi Al-Hadid Al-Mu'tazili ، Seventh Alwiite Poems ، as there is no a study tacking such a conjecture before. In the article there are two axes : the introduction comes as first axis portraying Imam Ali Ibn Abi Talib (peace be upon him) in the wa
... Show MoreObjectives: The present study aims at detecting the depression among nurses who provide care for infected patients with corona virus phenomenon and to find out relationships between the depression and their demographic characteristics of age, gender, marital status, type of family, education, and years of experience of nurses in heath institutions, infection by corona virus, and their participation in training courses.
Methodology: A descriptive study is established for a period from October 10th, 2020 to April 15th, 2021. The study is conducted on a purposive (non-probability) sample of (100) nurse who are providing care for patients with COVID-19 and they are selected from the isolation wards. The instrument of the study is develope
The main objective of this paper is to develop and validate flow injection method, a precise, accurate, simple, economic, low cost and specific turbidimetric method for the quantitative determination of mebeverine hydrochloride (MbH) in pharmaceutical preparations. A homemade NAG Dual & Solo (0-180º) analyser which contains two identical detections units (cell 1 and 2) was applied for turbidity measurements. The developed method was optimized for different chemical and physical parameters such as perception reagent concentrations, aqueous salts solutions, flow rate, the intensity of the sources light, sample volume, mixing coil and purge time. The correlation coefficients (r) of the developed method were 0.9980 and 0.9986 for cell
... Show MoreABSTRACT Background: The main goal of chemomechanical endodontic treatment is the reduction or elimination of microorganisms from root canal system. The intracanal medicaments were used to enhance the disinfection process. This study was conducted to evaluate the antibacterial effect of thymus vulgaris, tea tree essential oils and cold pressed black seed oil (BSO) against E.faecalis. Materials and methods: E.faecalis was isolated from ten patients in need for endodontic treatment. The sensitivity of E.faecalis to the tested oils was evaluated in different concentrations in agar well diffusion method and compared with calcium hydroxide. The sensitivity of E.faecalis to vapor of the tested oils was also evaluated, in disk vaporization method
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More