Image retrieval is an active research area in image processing, pattern recognition, and
computer vision. In this proposed method, there are two techniques to extract the feature
vector, the first one is applying the transformed algorithm on the whole image and the second
is to divide the image into four blocks and then applying the transform algorithm on each part
of the image. In each technique there are three transform algorithm that have been applied
(DCT, Walsh Transform, and Kekre’s Wavelet Transform) then finding the similarity and
indexing the images, useing the correlation between feature vector of the query image and
images in database. The retrieved method depends on higher indexing number.
Experimental results have shown better results (higher precision and recall) by applying
DCT on the image than the other transform algorithms and the performance improvement if
dividing the image into equal four blocks and applying the transformed algorithm into each
part
The topological indices are functions on the graph that do not depend on the labeling of their vertices. They are used by chemists for studying the properties of chemical compounds. Let be a simple connected graph. The Hyper-Zagreb index of the graph , is defined as ,where and are the degrees of vertex and , respectively. In this paper, we study the Hyper-Zagreb index and give upper and lower bounds for .
Vegetation monitoring is considered an important application in remote sensing task due to variation of vegetation types and their distribution. The vegetation concentration around the Earth is increase in 5% in 2000 according to NASA monitoring. This increase is due to the Indian vegetable programs. In this research, the vegetation monitoring in Baghdad city was done using Normalized Difference Vegetation Index (NDVI) for temporal Landsat satellite images (Landsat 5 TM& Landsat 8 OIL). These images had been used and utilize in different times during the period from 2000, 2010, 2015 & 2017. The outcomes of the study demonstrate that a change in the vegetation Cover (VC) in Baghdad city. (NDVI) generally shows a low v
... Show MoreIn order to study the correlation between CMV infection and increase in blood pressure among Iraqi patients, 201 blood samples were collected including; 88 male, 113 female hypertensive patients and 40 control samples. Patients sera were grouped into patients who are under medication (T), and patients who do not take any treat-ment for hypertension(NT). Samples were tested for CMV-IgM/IgG by ELISA, ren-in enzyme and interleukin-6(IL-6) levels were determined by ELISA too. The opti-cal density readings difference for CMV-IgG were significant between (T) and (NT) groups as well as when each group compared to control, level of renin enzyme showed significant difference between patients group(T and NT) and between each group compared to the
... Show MoreBackground: Prostaglandin D2 (PGD2) is a lipid mediator appeared as a powerful activator that regulates the T-helper2 (TH2) and Type-2 innate lymphoid cells (ILC2), and functions as diagnostic marker and it has probable therapeutic targets for asthma.
Objectives: To define the role of Prostaglandin D2 biomarkers in disease severity, and to forecast disease risk and progression.
Patients and methods: A case control study was conducted on Forty four Iraqi asthmatic patients and 44 apparently healthy controls who were age and sex matched. Four ml of blood samples was taken from the study groups for the detection PGD2 using ELISA.
Results: The se
... Show MoreUrinary Tract Infection is an infection that caused by the members of the genus
Proteus that depends mainly on the availability of virulence factors ;Various
virulence factors including biofilm, swarming migration , polysaccharide
,heamolysin,protease, DNase, urease production weredetermined for 45Proteus
isolates that obtained from clinical specimens of Urinry Tract Infection patient .
The distribution of virulence factors was showed variation among the testedisolates
and strain specific in most cases. All Proteus isolates showed 45 (100%)biofilm ,
polysaccharide andSwarming capabilities with different extents. High
ureaseproduction was demonstrated in most isolates 40 (88.8%);In addition, they
were abling to
Background: Chronic leg ischemia commonly affects the arteries supplying the leg and mostly caused by atherosclerosis. Triplex ultrasound scanning is useful for delineating the anatomic site of disease in the lower limb in addition to the grading of the stenosis and evaluation of post-stenotic flow.
Objectives: To determine the extent of vasculopathy in patients with chronic leg ischemia by using triplex ultrasound scanning and match the sonographic findings with the clinical signs and symptoms.
Patients and methods: A cross sectional study from October 2009 to September 2010 was performed on 56 patients with clinical suspicion of chronic leg ischemia referring to ultraso
... Show MoreImage pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The
... Show MorePassword authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.