In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
Background: The need for assisted reproduction technologies (ART) for the establishment of pregnancies has steadily increased worldwide. Therefore, it is of vital importance that an efficient sperm preparation technique used for retrieval of high-quality spermatozoa contributes to the creations of high-quality embryos, with high implantation potential.
Objective: to study the effect of swim up technique on human sperm motility and DNA integrity.
Subject and methods: A prospective study carried on 70 samples of human semen; each sample, divided into 2 parts, one part was prepared by swim-up technique and the other not, and then study sperm motility and DNA integrity in both parts. Sperm DNA integrity was determined using a modified
The Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intend
... Show MoreThe agent-based modeling is currently utilized extensively to analyze complex systems. It supported such growth, because it was able to convey distinct levels of interaction in a complex detailed environment. Meanwhile, agent-based models incline to be progressively complex. Thus, powerful modeling and simulation techniques are needed to address this rise in complexity. In recent years, a number of platforms for developing agent-based models have been developed. Actually, in most of the agents, often discrete representation of the environment, and one level of interaction are presented, where two or three are regarded hardly in various agent-based models. The key issue is that modellers work in these areas is not assisted by simulation plat
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Candida is the scientific name for yeast. It is a fungus that lives almost everywhere, including in human body. Usually, the immune system keeps yeast under control. If the individual is sick or taking antibiotics, it can multiply and cause an infection. Yeast infections affect different parts of the body in different ways including thrush is a yeast infection that causes white patches in oral cavity ,Candida esophagitis is thrush that spreads to esophagus, women can get vaginal yeast infections,(vaginitis) causing itchiness, pain and discharge, yeast infections of the skin cause itching and rashes ,yeast infections in bloodstream can be life-threatening . The current review article will concentrate on vaginal infection (vaginitis), project
... Show MoreIn this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model
... Show MoreA session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Deaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b
Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
Conventional dosage forms for topical and transdermal drug delivery have several disadvantages related mainly to its poor skin permeation and patient compliance. Many approaches have been developed to improve these dosage forms. Film forming drug delivery systems represents a recent advancement in this field. It provides improved patient compliance with enhanced skin permeation of drugs. In its simplest form, these consist of a polymeric solution, usually in a supersaturated state, in a suitable solvent. A plasticizer is usually added to improve the flexibility and enhance the tensile strength to the film. It is also possible to control and sustain the drug release from the films by controlling the polymeric content, concentration o
... Show More