Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform well in certain medical image applications.The aim of this paper is to change the medical image into something that is more meaningful and easier to analyze and recognize features that helps the doctors to diagnoses the diseases .This paper views selected medical image and segmentation method that have been proposed, which are suitable for processing medical images by use the modification of the traditional interactive threshold technique. This method gave good results,and these results are testedaccordingto the measure of quality (PSNR).
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Although the number of stomach tumor patients reduced obviously during last decades in western countries, but this illness is still one of the main causes of death in developing countries. The aim of this research is to detect the area of a tumor in a stomach images based on fuzzy clustering. The proposed methodology consists of three stages. The stomach images are divided into four quarters and then features elicited from each quarter in the first stage by utilizing seven moments invariant. Fuzzy C-Mean clustering (FCM) was employed in the second stage for each quarter to collect the features of each quarter into clusters. Manhattan distance was calculated in the third stage among all clusters' centers in all quarters to disclosure of t
... Show MoreThe study aims to evaluate the removal of sulfur content from Iraqi light naphtha produced in Al-Dora refinery by adsorption desulfurization DS technique using modified activated carbon MAC loaded with nickel Ni and copper Cu as single binary metals. The experiments were carried in a batch unit with various operating parameters; MAC dosage, agitation speed, and a contact time of 300 min at constant initial sulfur concentration 155 ppm and temperature. The results showed higher DS% by AC/Ni-Cu (66.45)% at 500 rpm and 1 g dosage than DS (29.03)% by activated carbon AC, increasing MAC dosage, agitation speed, and contact time led to increasing DS% values. The adsorption capacity of MAC results was recorded (16, 15, and 20) mg sulfu
... Show MoreThe study aims to evaluate the removal of sulfur content from Iraqi light naphtha produced in Al-Dora refinery by adsorption desulfurization DS technique using modified activated carbon MAC loaded with nickel Ni and copper Cu as single binary metals. The experiments were carried in a batch unit with various operating parameters; MAC dosage, agitation speed, and a contact time of 300 min at constant initial sulfur concentration 155 ppm and temperature. The results showed higher DS% by AC/Ni-Cu (66.45)% at 500 rpm and 1 g dosage than DS (29.03)% by activated carbon AC, increasing MAC dosage, agitation speed, and contact time led to increasing DS% values. The adsorption capacity of MAC results was recorded (16,
... Show MoreThe present work includes design, construction and operates of a prototype solar absorption refrigeration system, using methanol as a refrigerant to avoid any refrigerant that cause global warming and greenhouse effect. Flat plate collector was used because it’s easy, ninexpensive and efficient. Many test runs (more than 50) were carried out on the system from May to October, 2013; the main results were taken between the period of July 15, 2013 to August 15, 2013 to find the maximum C.O.P, cooling, temperature and pressure of the system. The system demonstrates a maximum generator temperature of 93.5 oC, on July 18, 2013 at 2:30 pm, and the average mean generator temperature Tgavr was 74.7 °C, for this period. The maximum pressure Pg
... Show MoreThe process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method
... Show More