Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Urinary stones are one of the most common painful disorders of the urinary system. Four new technologies have transformed the treatment of urinary stones: Electrohydraulic lithotripsy, ultrasonic lithotripsy, extracorporeal shock wave lithotripsy, and laser lithotripsy.The purpose of this study is to determine whether pulsed holmium laser energy is an effective method for fragmenting urinary tract stones in vitro, and to determine whether stone composition affects the efficacy of holmium laser lithotripsy. Human urinary stones of known composition with different sizes, shapes and colors were used for this study. The weight and the size of each stone were measured. The surgical laser system which used in our study is Ho:YAG laser(2100nm)
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreThis research aims to investigate the color distribution of a huge sample of 613654 galaxies from the Sloan Digital Sky Survey (SDSS). Those galaxies are at a redshift of 0.001 - 0.5 and have magnitudes of g = 17 - 20. Five subsamples of galaxies at redshifts of (0.001 - 0.1), (0.1 - 0.2), (0.2 - 0.3), (0.3 - 0.4) and (0.4 - 0.5) have been extracted from the main sample. The color distributions (u-g), (g-r) and (u-r) have been produced and analysed using a Matlab code for the main sample as well as all five subsamples. Then a bimodal Gaussian fit to color distributions of data that have been carried out using minimum chi-square in Microsoft Office Excel. The results showed that the color distributions of the main sample and
... Show MoreUranium concentrations in soil were determined for ten locations in Salahdin governorate using CR-39 track detector, fission fragments track technique was used, the nuclear reaction of nuclear fission fragments obtained by the bombardment of 235U with thermal neutrons from (Am-Be) neutron source with flux (5000n.cm-2.s-1), the concentration values were calculated by a comparison with standard samples. The results of the measurements show that the uranium concentration in soil samples various from 0.42±0.018ppm in Beji province to 0.2±0.014 ppm in Tooz province with an average (0.31±0.08ppm), the values of uranium concentration in all samples are within the permissible limits universally.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
Background Cold atmospheric plasma (CAP) is widely used in the cancer therapy field. This type of plasma is very close to room temperature. This paper illustrates the effects of CAP on breast cancer tissues both in vivo and in vitro. Methods The mouse mammary adenocarcinoma cell line AN3 was used for the in vivo study, and the MCF7, AMJ13, AMN3, and HBL cell lines were used for the in vitro study. A floating electrode-dielectric barrier discharge (FE-DBD) system was used. The cold plasma produced by the device was tested against breast cancer cells. Results The induced cytotoxicity percentages were 61.7%, 68% and 58.07% for the MCF7, AMN3, and AMJ13 cell lines, respectively, whereas the normal breast tissue HBL cell line exhibited very li
... Show MoreIn the current research, an eco-biosynthesis method for synthesizing silver nanoparticles (AgNPs) is reported using thymus vulgaris leaves (T. vulgaris) extracts. The optical and structural properties of the nanoparticles is determined using UV-visible, x-ray diffraction (XRD) and field emission scanning electron microscope (FESEM). In addition, the synthesis factors such as the temperature, the molar ratio of silver nitride and thymus vulgaris leaves extract have been investigated. The XRD pattern presented higher intensity for the five characteristic peaks of silver. FESEM images for same samples indicated that the particle size was distributed between 24-56 nm. In addition, it’s observed the formation of some aggregated Ag particles
... Show More